US8260935B2 - Error control terminal discovery and updating - Google Patents

Error control terminal discovery and updating Download PDF

Info

Publication number
US8260935B2
US8260935B2 US12/019,297 US1929708A US8260935B2 US 8260935 B2 US8260935 B2 US 8260935B2 US 1929708 A US1929708 A US 1929708A US 8260935 B2 US8260935 B2 US 8260935B2
Authority
US
United States
Prior art keywords
terminal
error control
packet
control protocol
aware
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US12/019,297
Other versions
US20080177884A1 (en
Inventor
Anil Agarwal
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Viasat Inc
Original Assignee
Viasat Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Viasat Inc filed Critical Viasat Inc
Priority to US12/019,297 priority Critical patent/US8260935B2/en
Assigned to VIASAT, INC. reassignment VIASAT, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: AGARWAL, ANIL
Publication of US20080177884A1 publication Critical patent/US20080177884A1/en
Assigned to UNION BANK, N.A. reassignment UNION BANK, N.A. SECURITY AGREEMENT Assignors: VIASAT, INC.
Application granted granted Critical
Publication of US8260935B2 publication Critical patent/US8260935B2/en
Assigned to WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL TRUSTEE reassignment WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL TRUSTEE SECURITY INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: VIASAT, INC.
Assigned to BANK OF AMERICA, N.A. reassignment BANK OF AMERICA, N.A. SECURITY AGREEMENT Assignors: VIASAT, INC.
Assigned to BANK OF AMERICA, N.A., AS AGENT reassignment BANK OF AMERICA, N.A., AS AGENT SECURITY AGREEMENT Assignors: VIASAT, INC.
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L1/12Arrangements for detecting or preventing errors in the information received by using return channel
    • H04L1/16Arrangements for detecting or preventing errors in the information received by using return channel in which the return channel carries supervisory signals, e.g. repetition request signals
    • H04L1/18Automatic repetition systems, e.g. Van Duuren systems
    • H04L1/1829Arrangements specially adapted for the receiver end
    • H04L1/1835Buffer management
    • H04L1/1841Resequencing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B7/00Radio transmission systems, i.e. using radiation field
    • H04B7/14Relay systems
    • H04B7/15Active relay systems
    • H04B7/185Space-based or airborne stations; Stations for satellite systems
    • H04B7/1853Satellite systems for providing telephony service to a mobile station, i.e. mobile satellite service
    • H04B7/18539Arrangements for managing radio, resources, i.e. for establishing or releasing a connection
    • H04B7/18543Arrangements for managing radio, resources, i.e. for establishing or releasing a connection for adaptation of transmission parameters, e.g. power control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L1/00Arrangements for detecting or preventing errors in the information received
    • H04L2001/0092Error control systems characterised by the topology of the transmission link
    • H04L2001/0097Relays

Definitions

  • the present invention relates to error control for communications in general and, in particular, to error control enhancements for satellite communications.
  • nuclear scintillation and “communications on the move” (COTM) related impairments may result in packet losses or other errors that are not sufficiently cured by such techniques. This may be particularly true in urban areas, where man-made structures (e.g., buildings, bridges, etc.) may impede signals as COTM terminals move about. Such blockages may negatively affect communications performance in terrestrial wireless systems also.
  • COTM nuclear scintillation and “communications on the move”
  • Novel error detection and retransmission systems, methods, devices, and software are described. These processes may be implemented on intermediate communication links between two end terminals, wherein the intermediate links are via satellite. Error control mechanisms to detect and retransmit lost or corrupted frames may be implemented at the network layer. Processes for discovering and updating error control protocol-aware terminals are described, as well. Features of these error control processes may include a configurable delay limit, tailored to traffic type or class.
  • a transmitting terminal with an ARQ unit receives an IP packet with a destination IP address.
  • the transmitting terminal may not be aware of the correspondence between the destination IP address and the particular receiving terminal (and associated ARQ unit).
  • the transmitting terminal sends a probe packet with an ARQ identifier to the destination IP address, and the receiving terminal intercepts the probe using the identifier.
  • the receiving terminal responds, and the ARQ table for each terminal is updated.
  • Other methods and systems are also described for updating ARQ tables. When users move between terminals, the ARQ tables in the terminals identifying their location may be updated to allow continued error control between terminals in a mobile environment.
  • a first ARQ-aware terminal maintains a listing of associations between each of a number of different destination network addresses and corresponding ARQ-aware terminals.
  • the first ARQ-aware terminal processes a data packet to be forwarded to the first destination network address, but determines that the first destination network address is not associated in the listing with an ARQ-aware terminal.
  • the first terminal may transmit a probe packet on the routing path to the first destination network address, the probe packet including an identifier formatted to be recognized by an ARQ-aware terminal.
  • a second ARQ-aware terminal on the routing path between the first ARQ-aware terminal and the end terminal captures the probe packet based on the identifier.
  • the second ARQ-aware terminal transmits a response packet identifying itself and the probe packet, the response packet including information for updating the listing of associations with an association between the first destination network address and the second ARQ-aware terminal.
  • FIG. 1 is a block diagram of a satellite communications system configured according to various embodiments of the invention.
  • FIG. 2 is a block diagram of a satellite communications system, illustrating selected devices and components for terminal to terminal communication, configured according to various embodiments of the invention.
  • FIG. 3 is a block diagram of a satellite communications system, illustrating selected devices and components for satellite to terminal communication, configured according to various embodiments of the invention.
  • FIG. 4A is a block diagram illustrating an example of the protocol layering for certain packet formatting occurring on a series of links according to various embodiments of the invention.
  • FIG. 4B is a block diagram illustrating an example of the frame structure for certain error control transmissions at the network layer according to various embodiments of the invention.
  • FIG. 4C is a block diagram illustrating an alternative example of the frame structure for certain error control transmissions at the network layer according to various embodiments of the invention.
  • FIG. 5A is a block diagram illustrating an example of the protocol layering for certain packet formatting occurring between HAIPE terminals according to various embodiments of the invention.
  • FIG. 5B is a block diagram illustrating an example of the frame structure for certain error control transmissions at the network layer between HAIPE terminals according to various embodiments of the invention.
  • FIG. 6 is a block diagram illustrating an example of the frame structure for certain error control transmissions between the network layer and the data link layer according to various embodiments of the invention.
  • FIG. 7A is a flowchart illustrating a method of transmitting error control information to a receiving terminal according to various embodiments of the invention.
  • FIG. 7B is a flowchart illustrating a method of transmitting error control information and managing associated buffers according to various embodiments of the invention.
  • FIG. 8A is a flowchart illustrating a method of receiving and responding to error control information from a transmitting terminal according to various embodiments of the invention.
  • FIG. 8B is a flowchart illustrating a method of receiving and responding to error control information and managing associated buffers according to various embodiments of the invention.
  • FIG. 9 is a block diagram illustrating a table associating destination network addresses with error control terminals according to various embodiments of the invention.
  • FIG. 10 is packet flow diagram illustrating a terminal discovery process between two terminals according to various embodiments of the invention.
  • FIG. 11A is packet flow diagram illustrating a terminal discovery process for a mobile host environment according to various embodiments of the invention.
  • FIG. 11B is packet flow diagram illustrating an alternative terminal discovery process for a mobile host environment according to various embodiments of the invention.
  • FIG. 12A is a flowchart illustrating a method of transmitting a terminal discovery probe packet according to various embodiments of the invention.
  • FIG. 12B is a flowchart illustrating a method of receiving a terminal discovery probe packet according to various embodiments of the invention.
  • FIG. 12C is a flowchart illustrating a method of updating error control terminal associations according to various embodiments of the invention.
  • FIG. 12D is a flowchart illustrating an alternative method of updating error control terminal associations according to various embodiments of the invention.
  • FIG. 13A is a flowchart illustrating a method of establishing error control communications between terminals in a mobile host environment according to various embodiments of the invention.
  • FIG. 13B is a flowchart illustrating a method of updating terminal associations for error control communications between terminals in a mobile host environment according to various embodiments of the invention.
  • FIG. 14 is a block diagram illustrating a table associating different types of traffic content with delay limits for error control terminals according to various embodiments of the invention.
  • FIG. 15 is packet flow diagram illustrating a range of options for packet retransmission according to various embodiments of the invention.
  • FIG. 16A is a flowchart illustrating a method of setting delay limits for error control retransmissions according to various embodiments of the invention.
  • FIG. 16B is a flowchart illustrating a method of setting delay limits for error control retransmissions based on traffic content according to various embodiments of the invention.
  • FIG. 17A is a flowchart illustrating a method of setting buffering time limits at receiving terminals according to various embodiments of the invention.
  • FIG. 17B is a flowchart illustrating a method of setting and monitoring time limits for missing packets at receiving terminals according to various embodiments of the invention.
  • Novel error detection and retransmission processes for communication systems are described.
  • these processes are implemented on intermediate communication links between two end terminals, wherein the intermediate links are via satellite.
  • error control mechanisms to detect and retransmit lost or corrupted frames are implemented at the network layer.
  • processes for discovering and updating error control protocol-aware terminals are described.
  • features of these error control processes include a configurable delay limit, which may be tailored to traffic type or class.
  • FIG. 1 a block diagram is shown illustrating a satellite communications system 100 with various links 120 in which the error control communications described herein may be implemented.
  • the system 100 includes a satellite 105 , in communication with various fixed terminals 110 and COTM terminals 115 .
  • one or more of the error control processes are implemented in the network layer of a link 120 - d between a satellite 105 and a COTM terminal 115 - c (in either direction).
  • the error control processes are implemented in the network layer of a link 120 - b between a first COTM terminal 115 - a and a second COTM terminal 115 - b .
  • the error control processes are implemented in the network layer of a link 120 - c between a COTM terminal 115 - b and a fixed terminal 110 - b (in either direction).
  • error control processes may be implemented in links (not shown) between two fixed terminals 110 , between a satellite 105 and fixed terminal 110 , or other combinations, as well. It is also worth noting that these error control mechanisms may be implemented within a network layer carrying encrypted data that is transported via IP tunneling. In some embodiments, the error control processes described herein are implemented between the network and data link layers. In still other embodiments, aspects of the error control communications (e.g., delay limits) described herein may be implemented at the data link or transport layers.
  • terminals include “ARQ units,” which may be integrated processing units at a terminal allowing a terminal to create, transmit, and identify the error control packets described herein, and engage in the ARQ sessions described.
  • the ARQ units may buffer data from ARQ packets at the transmit end until reception is confirmed or a timeout occurs.
  • the error control processes described herein may be made up of error control techniques to identify lost or damaged packets, and then retransmit identified packets if an applicable delay timer has not expired.
  • error control techniques may be referred to herein as ARQ error control mechanisms, or simply as ARQ.
  • packets are retransmitted only in response to specific NACKs identifying a missing packet or set of packets.
  • a hybrid scheme is used which is made up of a generalized retransmission strategy, in which selective retransmission and Go-Back-N retransmission are two particular cases.
  • An entire spectrum of behaviors between selective retransmission and Go-Back-N can be realized by suitably configuring the size of buffers available at the receiver for saving out-of-sequence packets, and otherwise setting forth parameters for detection and transmission based on a variety of factors.
  • the receiver saves received packets in a buffer (e.g., for an amount of time associated with the delay limit), and thereby allows for delivery of packets in sequence even when they are received out of order.
  • a transmitting terminal with an ARQ unit receives an IP packet with a destination IP address.
  • the transmitting terminal may not be aware of the correspondence between the destination IP address and the particular receiving terminal (and associated ARQ unit).
  • the transmitting terminal may send a probe packet with an ARQ identifier to the destination IP address, and the receiving terminal intercepts the probe using the identifier.
  • the receiving terminal responds, and the ARQ table for each terminal is updated.
  • Methods and systems are also described for updating ARQ tables. When users move between terminals, the ARQ tables in the terminals identifying their location may be updated to allow continued error control between terminals in a dynamic environment.
  • features of these error control mechanisms include a configurable delay limit tailored to traffic type or class.
  • TPv4 and TPv6 packets each include a one byte Type of Service (ToS) or Differentiated Services (DiffServ) field.
  • This field may be used to indicate the underlying service being transported.
  • the field could be used to define the delay sensitivity of the frame being transported.
  • Frames with different delay sensitivities e.g., UDP v. TCP packets, voice v. e-mail
  • multiple different ARQ sessions with differing delay limits may take place concurrently between terminals (or between a terminal and a satellite).
  • a receiver may be configured to transmit NACKs (and, possibly, ACKs) on a periodic basis.
  • a receiver may receive a polling request (e.g., a status request) from a transmitter to initiate the transmission, or may initiate the NACKs internally.
  • the internally or externally initiated polling period may be configurable based on a number of factors (e.g., particular terminals involved, estimated RTT, network error rate, link load, receipt of out-of-sequence packets, type or quality of service, etc.).
  • the polling period may be decreased (i.e., increasing the regularity of the ACK/NACK transmissions) when traffic is light.
  • retransmission is based only on NACKs, and this may decrease the number of unnecessary retransmissions.
  • progressive retransmission schemes may be used under severely degraded link conditions.
  • Progressive transmission is a process which may be used if a given frame is unsuccessfully transmitted a certain number of times (e.g., 3 unsuccessful transmissions). After this threshold is reached, more than one copy of the frame is transmitted, with the retransmitted frames spaced in time. This progressive retransmission puts additional burden on bandwidth, but may be useful in severely degraded link environments in lighter traffic periods.
  • the threshold, the number of packets retransmitted, and the timing increments may be configurable.
  • FIG. 2 a block diagram is shown illustrating an example configuration 200 for certain devices of the satellite communications system 100 of FIG. 1 . While the example configuration illustrates communication between a COTM terminal 115 and fixed terminal 110 , those skilled in the art will recognize that similar components may be used between other links for the same or other types of terminals, or between a satellite and a terminal.
  • an initiating terminal 205 transmits data via a network (e.g., the Internet or a wireless local area network (LAN)) to the COTM terminal 115 - b .
  • the data is received by the COTM terminal 115 - b .
  • the COTM terminal 115 - b is made up of a network layer processing unit 215 (including a routing unit 220 , an ARQ unit 225 and an IP Encapsulation Unit 230 ), a data link layer processing unit 235 , an RF frontend 240 , and other components known in the art.
  • the received data may, for example, be an IP packet carried by a wireless signal.
  • the IP packet may be received by the routing unit 220 of the network layer processing unit 215 .
  • the routing unit 220 may evaluate the destination address of the received IP packet, and recognize that it will be forwarded to a similar error control protocol-aware terminal, such as fixed terminal 110 - b (e.g., through the satellite 105 via link 120 - c ).
  • This lookup functionality may be achieved by having the routing unit 220 maintain or otherwise access a table that lists certain destination IP or other addresses that are associated with ARQ units.
  • the routing unit 220 may make a threshold determination as to whether the IP packet is directed to or through a node that can engage in an ARQ session at the IP layer, as described herein.
  • the network layer processing unit 215 may assign processing responsibilities for the received IP packet to an ARQ unit 225 .
  • the ARQ unit 225 may create an ARQ header to be associated with the received IP packet, the ARQ header including sequence number, session number, a timestamp, a retransmission delay limit, buffering time limits for a receiving terminal, and other information and/or identifiers for error detection.
  • the ARQ unit 225 may evaluate a Type of Service indicator in the received IP packet, and place the packet in the appropriate session based on the type of service (e.g., UDP v. TCP).
  • the ARQ unit 225 may buffer the data packet to be transmitted until acknowledgement information is received and/or processed to determine whether the data packet was received.
  • the ARQ unit 225 may buffer the data packet (allowing for possible retransmission) until a delay timer expires, and then discard the packet.
  • An IP encapsulation unit 230 may then encapsulate the ARQ header in an additional IP header, and append its associated IP packet, indicating in this IP header that it is an ARQ IP packet.
  • the indicator in the additional IP header may be used as a signal to other error control protocol-aware terminals that the packet includes an ARQ header and is to be processed by a receiving ARQ unit at the network layer.
  • error control protocol-aware terminal or “network layer error control protocol-aware terminal” may describe a terminal configured with an ARQ unit similar to ARQ unit 225 , and located on the routing path to a destination network address.
  • the IP encapsulation unit 230 may forward the ARQ packet to the data link layer processing unit 235 , where a data link protocol (e.g., HDLC) is applied.
  • a data link protocol e.g., HDLC
  • the link layer packet is then processed by RF frontend 240 , and transmitted via a wireless signal through the satellite 105 to the fixed terminal 110 - b.
  • the fixed terminal 110 - b receives the signal.
  • the fixed terminal 110 - b in this embodiment is made up of an RF frontend 245 , data link layer processing unit 250 , and a network layer processing unit 255 (including an IP decapsulation unit 260 , routing unit 265 , and ARQ unit 270 ).
  • Its RF frontend 245 may downconvert, amplify, and demodulate the signal, thereby reproducing the link layer packet from the COTM terminal 115 - b .
  • the received link layer packet header is generated by the satellite.
  • the data link layer processing unit 250 of the fixed terminal 110 - b may process the received packet, as known in the art, to produce the ARQ IP packet.
  • An IP decapsulation unit 260 may receive the ARQ IP packet, process the identifier in the header to recognize the packet as an ARQ IP packet, and forward it to the ARQ unit 270 for processing.
  • the ARQ unit 270 of the receiving fixed terminal 110 - b may analyze a sequence number, timestamp, retransmission delay limit, time limit for buffering, and any additional error control information from the ARQ header created by the ARQ unit 225 of the COTM terminal 115 - b .
  • the ARQ unit 270 of the fixed terminal 110 - b may analyze this error control information, in light of other ARQ packets received from the session, and transmit acknowledgement information (ACKs, NACKs, and/or other status information) to the ARQ unit 225 of the COTM terminal 115 - b .
  • acknowledgement information ACKs, NACKs, and/or other status information
  • the ARQ unit 270 of the fixed terminal 110 - b may generate a response packet with the acknowledgement information in response to the received error control header, and the acknowledgement information may be encapsulated at the network layer.
  • the response packet may be forwarded to the data link layer processing unit 250 , where a data link protocol (e.g., HDLC) is applied.
  • the link layer packet is then processed by RF frontend 245 , and transmitted via a wireless signal through the satellite 105 back to the ARQ unit 225 of the COTM terminal 115 - b .
  • the COTM terminal 115 - b upon receiving acknowledgement information that includes a NACK, may retransmit the buffered data packets (perhaps on the condition that time remains for an applicable delay limit).
  • the ARQ unit 270 of the receiving fixed terminal 110 - b may determine that the data packet is an out-of-sequence data packet, and buffer the packet until preceding data packets are received and forwarded to the end terminal (or a time limit based on a delay limit expires).
  • the ARQ unit 270 may wait to forward the buffered data packet to the end terminal until determining the data packet has become an in-sequence data packet, and that the intervening packets have been forwarded.
  • a buffered data packet may be retained until a buffering time limit is exceeded or neared (e.g., when a discard or forwarding time is specified for immediately before the time limit expires).
  • the buffered data packet may then be forwarded out-of-sequence and then discarded.
  • the IP decapsulation unit 260 identified the packet as a non-ARQ IP packet, other components (not shown) of the network layer processing unit 255 of the fixed terminal 110 - b may otherwise process the packet at the IP layer).
  • the ARQ unit 270 processing may further process and/or forward the packet out of the fixed terminal 110 - b .
  • the data which originated at initiating terminal 205 , and was routed through the COTM terminal 115 - b , satellite 105 , and fixed terminal 110 - b , may then be passed through a network 210 to an end terminal 275 .
  • the initiating terminal 205 and the end terminal 275 may each be remote from the COTM terminal 115 - b and fixed terminal 110 - b , thus the link may be an intermediate link within the end to end connection.
  • the initiating terminal 205 may also buffer the first data packet until an acknowledgement is received from the end terminal 275 (e.g., using a distinct TCP connection to provide multiple error control links).
  • an acknowledgement is received from the end terminal 275 (e.g., using a distinct TCP connection to provide multiple error control links).
  • FIG. 3 a block diagram is shown illustrating an example configuration 300 of components for the satellite communications system 100 of FIG. 1 .
  • the diagram illustrates certain differences from the terminal-to-terminal processing described above.
  • the ARQ unit is located on the satellite 105 , which communicates with a COTM terminal 115 - c over link 120 - d .
  • the satellite 105 includes an ARQ unit 305 , a data link layer processing unit 310 , a transmitter 315 , and may include other components known in the art.
  • data is received by the satellite, perhaps from a fixed terminal 110 .
  • the received data may, for example, include an IP packet carried by a wireless signal.
  • the IP packet may be received by the ARQ unit 305 .
  • the ARQ unit 305 may evaluate a destination (IP or other) address associated with the received IP packet, and recognize that it will be passing through the ARQ-aware COTM terminal 115 - c , via link 120 - d .
  • This lookup functionality could be achieved by having the ARQ unit 305 maintain or otherwise access a table that lists MAC addresses or other terminal addresses that are associated with ARQ units capable of ARQ sessions according to particular embodiments of the invention.
  • the ARQ unit 305 may create an ARQ header to be associated with the received IP packet, the ARQ header including a sequence number, a session identifier, a timestamp, time and/or delay limits, and other information for error detection.
  • the ARQ unit 305 may place the packet in an appropriate session based on the type of service (e.g., real-time interactive v. email). In this way, packets with different delay sensitivities or quality of service guarantees may have different delay timers, buffer or window sizes, polling timers, etc., and these parameters may be isolated to the satellite to terminal links.
  • the ARQ unit 305 may forward the ARQ header and associated IP packet to the data link layer processing 310 unit, where a data link protocol (e.g., HDLC) is applied, encapsulating the ARQ header and associated IP packet.
  • a data link protocol e.g., HDLC
  • the error control data is located between the network and data link layers.
  • the link layer packet is then processed by the transmitter 315 , and sent via a wireless signal through the satellite 105 to the COTM terminal 115 - c.
  • the COTM terminal 115 - c receives the signal.
  • the COTM terminal 115 - c in this embodiment is made up of an RF frontend 245 , a data link layer processing unit 250 , an ARQ unit 320 , and a network layer processing unit 255 (including an IP decapsulation unit 260 ).
  • Its RF frontend 245 may downconvert, amplify, and demodulate the signal, thereby producing the link layer packet from the satellite 105 .
  • the data link layer processing unit 250 of the COTM terminal 115 - c may process the received packet, as known in the art, to produce the ARQ header and associated IP packet.
  • the data link layer processing unit 250 may recognize an identifier in the data link layer header, and forward the packet to the ARQ unit 320 for processing.
  • the ARQ unit 320 may analyze the sequence number, timestamp, and other information, in light of other ARQ packets received from the session. The ARQ unit 320 may then transmit ACKs, NACKs, and other status information to the ARQ unit 305 of the satellite 105 .
  • a network layer processing unit 255 may receive the IP packet, and the IP decapsulation unit 260 may process the packet as a regular IP packet, and forward the packet out of the COTM terminal 115 - c (e.g., the packet, without its ARQ header, may be processed by the IP decapsulation unit 260 ). Other components may further process and/or forward the packet out of the COTM terminal 115 - b , to then be passed through a network 210 to an end terminal 275 .
  • the error control data may be encapsulated at the network layer, in other embodiments the error control data may be encapsulated between the network layer and data link layers. In still other embodiments, certain aspects of the error control protocols described herein may be implemented at the data link layer or transport layer, for example.
  • the description with reference to FIG. 3 is directed at a link from a satellite 105 to a COTM terminal 115
  • the session at issue may also be from the COTM terminal 115 to the satellite 105 , wherein the ARQ header formatting is applied at the COTM terminal 115 , and then received and processed at the satellite 105 . According to the embodiment described with reference to FIG.
  • the satellite 105 may, therefore, operate as a receiver and transmitter for the same IP packet (e.g., with a COTM terminal 115 - a to satellite 105 link, and then from the satellite 105 to COTM terminal 115 - b link).
  • IP packet e.g., with a COTM terminal 115 - a to satellite 105 link, and then from the satellite 105 to COTM terminal 115 - b link.
  • the above description is directed at the link between a satellite 105 and COTM terminal 115 , a similar process and components may be applied to other satellite 105 to fixed terminal 110 links 120 - a , as well, or in a number of other terminal to terminal connections.
  • a fixed terminal 110 COTM terminal 115 , or satellite 105 of FIG. 2 or 3 may be implemented, in whole or in part, in hardware.
  • they may each be made up of one, or more, Application Specific Integrated Circuits (ASICs) adapted to perform a subset of the applicable functions in hardware.
  • ASICs Application Specific Integrated Circuits
  • the functions may be performed by one or more other processing units (or cores), on one or more integrated circuits.
  • other types of integrated circuits may be used (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays (FPGAs), and other Semi-Custom ICs), which may be programmed in any manner known in the art.
  • Each may also be implemented, in whole or in part, with instructions embodied in a memory, formatted to be executed by one or more general or application specific processors.
  • the tables described above may be stored in local memory.
  • FIG. 4A a block diagram is shown illustrating an example of the protocol layering for certain packet formatting 400 occurring on a series of links between two users 205 , 275 .
  • an intermediate link 120 (e.g., from the system 100 of FIG. 1 ) is between a COTM terminal 115 and a fixed terminal 110 .
  • FIG. 4A illustrates the physical layer 404 , data link layer 408 , network layer 412 , and transport and application layer 416 processing that may occur at each user terminal 205 , 275 , HAIPE terminal 402 , intermediate terminal 110 , 115 , or satellite 105 .
  • FIG. 4A illustrates the physical layer 404 , data link layer 408 , network layer 412 , and transport and application layer 416 processing that may occur at each user terminal 205 , 275 , HAIPE terminal 402 , intermediate terminal 110 , 115 , or satellite 105 .
  • ARQ error control data may be created at the COTM terminal 115 IP layer 420 , and be processed at the IP layer 424 by the receiving fixed terminal 110 .
  • ARQ operates over a terminal to terminal IP tunnel.
  • the illustrated packet formatting may take place between other terminal to terminal or terminal to satellite connections.
  • FIG. 4B a block diagram is shown illustrating an example of the frame structure 425 for various embodiments of the invention. This may, for example, be the frame format generated at the COTM terminal 115 , as set forth the FIG. 4A .
  • a COTM terminal 115 may receive a HAIPE encrypted IP packet 430 encapsulated by an unencrypted IP header 435 - a , thereby forming a payload made up of an IP packet 440 (note that in other embodiments, other types of packets could be received or otherwise created at the COTM terminal 115 to form the payload; e.g., the payload could be an IP packet encapsulating an IPSEC encrypted packet, or some other IP packet carrying an unencrypted payload).
  • the COTM terminal 115 includes an ARQ unit (e.g., the ARQ unit 225 shown in FIG. 2 ) configured to encapsulate the received IP packet 440 to form an expanded IP packet 445 (or, in other embodiments, this may be some other network layer packet format).
  • This expanded IP packet 445 contains a second outer IP header 450 with a field indicating that it is an ARQ packet and specifying the IP address (e.g., for an end user 275 ).
  • the IP packet 445 also includes an ARQ header 455 (e.g., a 4 byte ARQ header) which may contain a sequence number, a timestamp, session number, and other information for error detection.
  • the expanded IP packet 445 is then encapsulated in an HDLC header 460 (or other data link layer protocol), to form a data link layer HDLC packet 465 .
  • This packet is then transported, via the satellite, to the fixed terminal 110 , which includes another ARQ unit (e.g., the ARQ unit 270 at the fixed terminal 110 - b shown in FIG. 2 ).
  • the fixed terminal 110 processes the IP header 450 for the expanded IP packet 445 and, recognizing that it is an ARQ packet, forwards it to an ARQ unit therein.
  • the ARQ unit at the fixed terminal 110 may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer. In this way, the ARQ processing units at the COTM terminal 115 and the fixed terminal 110 may perform the error control functionality at the IP layer via the satellite 105 .
  • the ARQ unit (e.g., ARQ unit 270 ) at the receiving fixed terminal 110 may respond with acknowledgement information (ACKs, NACKs, or other status reports) or session initiation responses transmitted at the network layer to the ARQ unit (e.g., ARQ unit 225 ) at the transmitting COTM terminal 115 .
  • acknowledgement information ACKs, NACKs, or other status reports
  • session initiation responses transmitted at the network layer to the ARQ unit (e.g., ARQ unit 225 ) at the transmitting COTM terminal 115 .
  • the payload 440 need not be aware of the ARQ functionality.
  • the data link layer i.e., the HDLC layer
  • the ARQ unit at the COTM terminal 115 may retransmit lost or damaged packets after receiving the appropriate ACKs or NACKs, if the delay limit (as applicable) is not exceeded given the applicable type of service.
  • the ARQ unit e.g., ARQ unit 225 or 270
  • the ARQ unit may be configured to apply the additional IP layer ( 420 , 424 ) only when a packet is destined for a terminal with an ARQ unit with IP layer functionality.
  • the COTM terminal 115 may maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once.
  • control packet 470 may be sent on forward or reverse links.
  • the ARQ unit may be implemented in a box outside of the COTM terminal (e.g., between the HAIPE terminal and COTM terminal).
  • the terminal to terminal link may be between fixed terminals 110 , COTM terminals 115 , or any alternative combination thereof.
  • FIG. 4C a block diagram is shown illustrating an alternative example of the frame structure 475 for various embodiments of the invention. This may, for example, be the frame format processed between terminals (e.g., the terminals 110 , 115 set forth in FIG. 4A ).
  • a COTM terminal 115 again receives a HAIPE encrypted IP packet 430 appended to an unencrypted IP header 435 - b , thereby forming a payload made up of an IP packet 440 (again note that in other embodiments, other types of packets could be received or otherwise created at the COTM terminal 115 to form the payload, e.g., the payload could be an IP packet encapsulating an IPSEC encrypted packet, or some other IP packet carrying an unencrypted payload).
  • the COTM terminal 115 includes an ARQ unit (e.g., ARQ unit 225 of FIG. 2 ) configured to insert or otherwise include an ARQ header 480 (e.g., a 4 byte ARQ header) between the unencrypted IP header 435 - b and the ESP header.
  • the ARQ header may contain a sequence number, a timestamp, session number, and other information for error detection.
  • the expanded IP packet 485 is then encapsulated in a HDLC header 460 (or other data link layer protocol) to form a data link layer HDLC packet 490 .
  • This packet is then transported, via the satellite 105 , to the fixed terminal 110 , which includes another ARQ unit (e.g., the ARQ unit 270 shown in FIG. 2 ).
  • the fixed terminal 110 processes the IP header 435 - b for the expanded IP packet 485 and, recognizing that it is an ARQ packet (because it is so indicated in the header), forwards it to its ARQ unit therein.
  • the ARQ unit at the fixed terminal 110 may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer. Response or other acknowledgement packets may similarly be transported in the reverse direction at the IP layer, as well.
  • the ARQ protocol described herein may operate in non-tunneled mode, and the ARQ overhead may be decreased from an extra 40 bytes (e.g., with IPv6) to an extra four bytes in this example.
  • the encrypted payload 430 need not be aware of the ARQ functionality.
  • the data link layer i.e., the HDLC layer
  • the ARQ unit at the COTM terminal 115 may retransmit lost or damaged packets after receiving the appropriate ACKs or NACKs, if the delay limit is not exceeded given the applicable type of service.
  • An ARQ unit e.g., ARQ unit 225 or 270
  • the COTM terminal 115 may again maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once. Note that a format for a control packet 495 is illustrated as well, which may be sent on forward or reverse links.
  • FIG. 5A a block diagram is shown illustrating an example of certain packet formatting 500 which occurs on a series of links between two users 205 , 275 .
  • An intermediate link 530 is illustrated.
  • the communication passes from a user 205 , through a HAIPE terminal 520 - a (which includes an ARQ unit), a first intermediate terminal 115 , a satellite 105 , a second intermediate terminal 110 , and then on through a second HAIPE terminal (which includes an ARQ unit) 520 - b .
  • FIG. 5A illustrates the physical layer 504 , data link layer 508 , network layer 512 , and transport and application layer 516 processing that occurs at each device or set of devices.
  • the ARQ error control frame may be created at the IP layer 524 by a HAIPE terminal 528 outside of the intermediate terminal-to-terminal connections described above, passing in encrypted form through the intermediate terminals and satellite, and be processed at the IP layer 528 of a receiving HAIPE terminal 520 - b .
  • the illustrated packet formatting may take place with one, or more, other types of terminals outside of the terminal to satellite to terminal connections described above.
  • FIG. 5B a block diagram is shown illustrating an example of a frame structure 535 for various embodiments of the invention.
  • a HAIPE terminal HAIPE terminal 524 receives an unencrypted IP packet 540 .
  • the HAIPE terminal 524 may evaluate the destination address of the received IP packet and recognize that it will be forwarded to a similar ARQ aware HAIPE terminal 528 (through the satellite 105 ).
  • This lookup functionality could be achieved by having an ARQ unit in the HAIPE terminal maintain or otherwise access a table that lists certain IP or other addresses that are associated with ARQ units.
  • the HAIPE terminal 520 - a includes an ARQ unit configured to append or otherwise associate an ARQ header 545 (e.g., a 4 byte ARQ header) onto the IP packet 540 .
  • the ARQ header 545 may contain a sequence number, a timestamp, session number, and other information for error detection.
  • the expanded packet is then encapsulated with an outer IP header 550 (or other network layer protocol), and encrypted to form an encrypted IP packet 555 with an encrypted ARQ header.
  • the encrypted packet 555 is then encapsulated by an outer, unencrypted IP header 560 .
  • a data link layer header 565 is added, forming a data link layer packet 570 to be transported through the network with the payload 555 encrypted.
  • This layering may be used on forward and reverse links.
  • the intermediate terminals (fixed 110 and/or COTM 115 ) and satellite 105 need not be aware of the contents of the encrypted ARQ packet.
  • the HAIPE terminal 520 - b on the receiving end decrypts the packet 555 , and recognizes that it is an ARQ packet (because the protocol value field therein so indicates).
  • the HAIPE terminal forwards it to an ARQ unit therein.
  • the ARQ unit at the HAIPE terminal 520 - b may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer.
  • the intermediate terminals need not be aware of the ARQ functionality.
  • the ARQ unit at the transmitting HAIPE terminal 520 - a may retransmit lost or damaged packets after receiving the appropriate ACKs, or NACKs from the receiving HAIPE terminal 520 - b , if the delay limit is not exceeded given the applicable type of service.
  • the HAIPE terminal 520 - a may maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once.
  • control packet 575 may be also sent on forward or reverse links.
  • the ARQ unit at a terminal may have a number of different sessions depending on the type of service or QoS features of the packet. Different types and qualities of service may be configured to have error control sessions at different terminals.
  • the HAIPE terminal—HAIPE terminal link may be between other terminals.
  • ARQ units e.g., the ARQ units ( 225 , 270 , 320 ) of FIGS. 2 and 3 ) or other processing units in a terminal may maintain tables that link destination IP addresses (or other destination addresses) with other ARQ units. For each ARQ unit in a table, there may be an additional correspondence with a particular session number or other identifier.
  • an IP packet e.g., the IP packet 440 of FIG. 4B or 4 C
  • an ARQ unit e.g., the ARQ unit 225 at COTM terminal 115 - b of FIG. 2
  • a table may be accessed to identify a receiving ARQ unit corresponding to the destination IP address.
  • a Type of Service field in the received IP packet may be accessed, and this field may be used to identify the appropriate session for the IP packet.
  • the transmitting ARQ unit may append an outer IP header (e.g., IP header 550 ) and an ARQ header (e.g., 545 ) at the network layer, thereby encapsulating the received IP packet.
  • a session identifier, sequence number, and other error control information may be included in the ARQ header, and the packet may thus be transmitted to the receiving ARQ unit at the IP layer.
  • a block diagram is shown illustrating an example of the frame structure 600 for various embodiments of the invention.
  • This may, for example, be the frame format processed at the satellite 105 , as set forth in FIG. 3 (or used in the reverse direction).
  • a satellite 105 may receive a HAIPE encrypted IP packet 605 encapsulated by an unencrypted IP header 610 , thereby forming a payload made up of an IP packet 615 (note that in other embodiments, other types of packets could be received or otherwise created at the satellite to form the payload, e.g., the payload could be an IP packet encapsulating an IPSEC encrypted packet, or some other IP packet carrying an unencrypted payload).
  • the satellite 105 includes an ARQ unit (e.g., the ARQ unit 320 shown in FIG. 3 ) configured to append or otherwise include an ARQ header 620 (e.g., a 4 byte ARQ header) onto the IP packet 615 .
  • the ARQ header 620 may contain a sequence number, a timestamp, a session number, delay and/or time limits, and other information for error detection.
  • the expanded packet 630 is then encapsulated in a HDLC header 625 (or other data link layer protocol) to form a data link layer HDLC packet 635 .
  • This packet is then transported to the terminal 110 , 115 , which includes another ARQ unit (e.g., the ARQ unit 320 at the COTM terminal 115 - c shown in FIG. 3 ).
  • the COTM terminal 115 - c processes the HDLC header for the packet 635 , recognizing that it is an ARQ packet (because the protocol value field therein so indicates), and forwards it to the ARQ unit.
  • the ARQ unit at the COTM terminal 115 - c may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer.
  • the payload 615 need not be aware of the ARQ functionality.
  • the ARQ unit at the satellite may retransmit lost or damaged packets after receiving the appropriate ACKs or NACKs, if the delay limit is not exceeded given the applicable type of service.
  • the ARQ unit may be configured to apply the ARQ header 620 only when a packet is destined for a terminal with an ARQ unit with IP layer functionality.
  • the satellite 105 may maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once.
  • a format for a control packet 640 is illustrated as well, and it may be sent on forward or reverse links.
  • the ARQ unit may be implemented in a box outside of the terminal (e.g., between the HAIPE terminal and COTM terminal 115 ).
  • the session at issue may also be from the COTM terminal 115 to the satellite 105 , wherein the ARQ header formatting is applied at the COTM terminal 115 , and then received and processed at the satellite 105 .
  • the satellite 105 may, therefore, operate as a receiver and transmitter for the same IP packet (e.g., with a COTM terminal 115 - a to satellite 105 link, and then from the satellite 105 to COTM terminal 115 - b link).
  • the satellite/terminal link may be between a satellite and a fixed terminal as well.
  • FIG. 7A is a flowchart illustrating a method 700 of transmitting error control information to a receiving terminal according to various embodiments of the invention.
  • the method 700 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a first data packet is processed, the first data packet destined for an end terminal via an intermediate terminal.
  • a first error control header is generated for the first data packet.
  • the first error control header is encapsulated for transmission at the network layer appended to the first data packet.
  • a second data packet appended to a second error control header is received, the second data packet and appended second error control header transmitted from the intermediate terminal in response to the first error control header.
  • the second error control header is encapsulated for transmission at the network layer, and includes acknowledgement information for receipt of the first data packet.
  • FIG. 7B is a flowchart illustrating a method 725 of transmitting error control information and managing associated buffers according to various embodiments of the invention.
  • the method 700 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a first data packet is received from a remotely located initiating terminal, the first data packet destined for a remote end terminal via an intermediate terminal.
  • a table of associations is maintained, the associations relating destination network addresses to network layer error control protocol-aware terminals.
  • the first data packet is identified, via the table, as a data packet that will pass through a network layer error control aware terminal, wherein the network layer error control aware terminal is the intermediate terminal.
  • the first data packet is buffered.
  • a first error control header is generated for the first data packet.
  • the first error control header is encapsulated for transmission at the network layer appended to the first data packet.
  • the first data packet and appended first error control header are transmitted to the remotely located intermediate terminal via satellite.
  • a second data packet and appended second error control header are received, the second data packet and appended second error control header transmitted from the intermediate terminal in response to the first error control header.
  • the second error control header is encapsulated for transmission at the network layer, and includes acknowledgement information for the first data packet.
  • the buffered first data packet is discarded after processing the acknowledgement information from the received second error control header to determine whether the buffered data packet is to be retransmitted.
  • FIG. 8A is a flowchart illustrating a method 800 of receiving error control information from a transmitting terminal according to various embodiments of the invention.
  • the method 800 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a first data packet and appended first error control header are received, the first error control header encapsulated at the network layer.
  • error control information in the first error control header is analyzed.
  • a second error control header is generated including acknowledgement information in response to the analyzed error control information.
  • the second error control header is encapsulated for transmission at the network layer appended to a second data packet.
  • FIG. 8B is a flowchart illustrating a method 825 of receiving and responding to error control information and managing associated buffers according to various embodiments of the invention.
  • the method 825 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a first data packet appended to a first error control header is received via satellite, the first error control header encapsulated at the network layer.
  • the first error control header is identified as data generated by a network layer error control protocol-aware terminal, wherein the network layer error control aware terminal is a terminal between an initiating terminal and an end receiving terminal.
  • error control information in the first error control header is analyzed to identify the first data packet as an out-of-sequence packet.
  • the first data packet is buffered based on the analysis of the first error control header indicating the first data packet is an out-of-sequence data packet.
  • a second error control header including sequencing and acknowledgement information (e.g., identifying received and missing packets) is generated in response to the analyzed error control information.
  • the second error control header is encapsulated for transmission at the network layer appended to a second data packet.
  • the second error control header and the appended second data packet are transmitted, via the satellite, the transmission directed to the network layer error control protocol-aware terminal.
  • the buffered first data packet is forwarded to a remotely located end terminal upon determining the first data packet has become an in-sequence data packet. In other embodiments, the forwarding may occur after a buffering time expires or before a buffering time is set to expire. At block 870 , the buffered first data packet is discarded after it is forwarded.
  • a transmitting terminal with an ARQ unit typically receives a data packet with a destination network address.
  • the routing unit 220 may evaluate the destination network address of the received data packet to determine whether it will be forwarded to a similar ARQ-aware fixed terminal 110 - b (e.g., through the satellite 105 via link 120 - c ).
  • This lookup functionality may be achieved by maintaining a listing of associations between each of a number of destination network addresses and one or more error control protocol-aware terminals.
  • the routing unit 220 of FIG. 2 may maintain or otherwise access a table in a memory that lists certain destination network addresses that are associated with ARQ units.
  • FIG. 9 an example of such a table 900 is shown, associating IP addresses with network layer error control protocol-aware terminal.
  • the left column lists a number of destination IP addresses 905 , while the right column sets forth the network layer error control protocol-aware terminals 910 associated with each listed IP address.
  • This type of table 900 may, for example, be used when an error control protocol-aware terminal (e.g., a fixed terminal 110 or COTM terminal 115 of FIG. 1 or 2 ) is deciding whether to perform the ARQ error control processing described herein.
  • an error control protocol-aware terminal e.g., a fixed terminal 110 or COTM terminal 115 of FIG. 1 or 2
  • the transmitting terminal may not be aware of the correspondence between the destination network address and the particular receiving terminal (and associated ARQ unit).
  • the transmitting terminal may send a probe packet with a probe packet identifier to the destination IP address to discover such a terminal, and the receiving terminal captures the probe based on the identifier.
  • the receiving terminal responds, and the ARQ table for each terminal is updated. Methods and systems are also described for updating ARQ tables. When users move between terminals, the ARQ tables in the terminals identifying their location may be updated to allow continued error control between terminals in a dynamic environment.
  • FIG. 10 is a packet flow diagram 1000 illustrating an example flow of packets between the COTM terminal 115 - b and fixed terminal 110 - b of FIGS. 1 and 2 , according to an embodiment of the invention.
  • the discovery process may occur between other error control protocol-aware terminals or nodes in a network.
  • the COTM terminal 115 - b receives a user packet 1005 with a source and destination IP address from a user 205 .
  • the COTM terminal 115 - b accesses a table (e.g., accessing table 900 of FIG. 9 using ARQ unit 225 of FIG. 2 ) to determine whether there is a terminal (and possibly session identifier) that is associated with the destination IP address. Not finding such an entry, the COTM terminal 115 - b formats and forwards a probe packet 1010 (referred to as an ARQ-DS-REQ packet in FIG. 10 ).
  • This packet 1010 may, for example, be formatted as the ARQ packet 445 or control packet 470 of FIG.
  • probe IP packet 1010 There is an indicator in the probe IP packet 1010 that it is a probe packet (or more generally, an ARQ packet), and this indicator may be in the “Next Protocol Field” of the probe IP packet 1010 (this indicator, therefore, may be referred to herein as an “identifier” or “probe packet identifier”). This identifier is formatted to allow a next error control protocol-aware terminal to identify and capture terminal information in the probe packet 1010 .
  • the COTM terminal 115 - b may also forward the received user packet 1005 (without the error control processes described herein). It may also hold the received user packet 1005 in a buffer until the listing is updated with a receiving terminal entry for the destination network address, or until an ARQ session is established.
  • the probe packet 1010 may be configured to carry the IP packet 1005 as its payload, and thus the probe packet 1010 may include the user packet 1005 .
  • the probe packet 1010 is received, and may be captured based on the identifier.
  • the probe packet 1010 is processed, and the fixed terminal 110 - b recognizes the packet as a probe packet, identifying the source IP address and the COTM terminal 115 - b .
  • the fixed terminal 110 - b may then update its own ARQ table, thereby associating the source IP address with the COTM terminal 115 - b .
  • the fixed terminal formats and transmits a response packet 1015 (referred to as an ARQ-DS-Response packet in FIG. 10 ).
  • This packet 1015 may be formatted as the ARQ packet 445 or 485 or control packet 470 or 495 of FIG. 4B or 4 C (with the destination IP address the same as the source IP address of the received IP packet 1005 , or perhaps the IP address of the COTM terminal 115 - b ). There is another identifier in the response packet 1015 that it is a response packet, and this indicator may be in the “Next Protocol Field” of the response packet 1015 .
  • the COTM terminal 115 - b then receives the response packet 1015 , and updates its ARQ table to associate the fixed terminal 110 - b with the destination IP address of the IP packet 1005 .
  • the COTM terminal 115 - b (perhaps with its ARQ unit) may then access a table to determine whether there is a session corresponding to the COTM terminal 115 - b to fixed terminal 110 - b link, and whether that session may be applicable to the type or quality of service associated with an IP packet to be sent to over the link.
  • the COTM terminal 115 - b formats and forwards a session establishment IP packet 1020 (referred to as an ARQ-Open packet in FIG. 10 ).
  • This packet 1020 may be formatted as the ARQ packet 445 or 485 or control packet 470 or 490 of FIG. 4B or 4 C, with the destination IP address the same as the destination IP address of the user packet 1005 or the fixed terminal 110 - b .
  • the fixed terminal 110 - b may then receive the session establishment packet 1020 , and create a session entry associated with the content classification of the data packet (e.g., based on whether the user packet is audio or video, streaming or interactive, and on quality of service requirements, or other).
  • the fixed terminal 110 - b formats and forwards a session ACK packet 1025 (referred to as an ARQ-Open Ack packet in FIG. 10 ).
  • This packet 1025 may, as above, be formatted as the ARQ packet or ARQ control packet (with the destination IP address the same as the source IP address of the user packet 1005 , or perhaps the IP address of the COTM terminal 115 - b ).
  • the COTM terminal 115 - b receives and processes the session ACK packet 1025 , and the session is thereby established.
  • the COTM terminal 115 - b may transmit the buffered data packet 1030 with appended error control data along the routing path toward the destination network address.
  • the transmitted error control data may include a sequence number and an identifier to allow the fixed terminal 110 - b to capture the error control data.
  • the data packet may be integrated into the probe packet 1010 , or may be received separately by the by fixed terminal 110 - b .
  • the data packet will, regardless of how it is received, be transmitted 1035 to the end terminal 275 .
  • the fixed terminal 110 - b may further respond by transmitting acknowledgement information back to the COTM terminal 115 - b , and the acknowledgement information may include the sequence number.
  • ARQ units e.g., the ARQ units ( 225 , 265 , 305 , 320 ) of FIGS. 2 and 3
  • tables e.g., table 900 of FIG. 9
  • FIG. 9 the movement of a user from a first terminal to a second terminal.
  • 11A is a packet flow diagram 1100 illustrating the flow of packets between the COTM terminal 115 - b a first fixed terminal 110 - b , and a second fixed terminal 110 - a of FIG. 1A , according to an embodiment of the invention.
  • the host mobility process may occur between other terminals or nodes in a network.
  • the COTM terminal 115 - b receives a user packet 1105 with a source and destination IP address.
  • the COTM terminal 115 - b accesses a table (e.g., table 900 of FIG. 9 using ARQ unit 225 of FIG. 2 ) to determine whether there is a terminal (and possibly session identifier) that is associated with the destination IP address and packet type. Finding such an entry, the COTM terminal 115 - b formats and forwards a modified user packet 1110 (e.g., as an ARQ IP packet 445 of FIG. 4B with the user packet 1105 as payload).
  • a modified user packet 1110 e.g., as an ARQ IP packet 445 of FIG. 4B with the user packet 1105 as payload.
  • the ARQ IP packet 1110 is received.
  • the ARQ IP packet 1110 is processed, and the fixed terminal 110 - b recognizes the packet as an ARQ packet.
  • the fixed terminal 110 - b determines that the destination host (of user packet 1105 ) is no longer accessible (e.g., by accessing its own ARQ table, or otherwise receiving data indicating no reachability). this may be because the host moved 1102 to a second fixed terminal 110 - a .
  • the fixed terminal 110 - b may update its own ARQ table if necessary (associating the COTM terminal 115 - b with the source IP address), and format and transmit an error packet 1115 (referred to as an ARQ-DS-Error packet in FIG. 11A ).
  • This packet 1115 may be formatted as the control packet 470 of FIG. 4B (with the destination IP address the same as the source IP address of the user packet 1105 , or perhaps the IP address of the COTM terminal 115 - b ).
  • the COTM terminal 115 - b then receives the error packet 1115 , and updates its ARQ table to end the association of the fixed terminal 110 - b with the destination IP address of the IP packet 605 .
  • the COTM terminal 115 - b formats and forwards a probe IP packet 1120 (referred to as an ARQ-DS-REQ packet in FIG. 11A , and equivalent to packet 1010 of FIG. 10 ).
  • This packet 1120 may be formatted as the ARQ IP packet or ARQ control packet FIG. 4B or 4 C, for example, with the destination IP address the same as the destination IP address of the originally received user packet 1105 .
  • the COTM terminal 115 - b may also forward the received IP packet 1105 that has been buffered, or continue to hold it in a buffer until an ARQ session is established (alternatively, the probe packet 1120 might be configured to carry the IP packet 1105 as its payload). Other methods may be used to retransmit the originally received IP packet 1105 , as well, perhaps depending on an applicable delay limit.
  • the probe IP packet 1120 is captured.
  • the probe IP packet is processed, and the fixed terminal 110 - a recognizes the packet as an ARQ packet (or, possibly as an ARQ control packet) with a destination IP address for one of its reachable users.
  • the fixed terminal 110 - a may then update its own ARQ table (e.g., table 900 of FIG. 9 ), thereby associating the source IP address with the COTM terminal 115 - b .
  • the fixed terminal 110 - a formats and forwards a response packet 1125 (referred to as an ARQ-DS-Response packet in FIG. 11A ).
  • This packet 1125 may be formatted as the ARQ packet 445 or 485 or control packet 470 or 490 of FIG. 4B or 4 C (with the destination IP address the same as the source IP address of the received IP packet 1105 , or perhaps the IP address of the COTM terminal 115 - b ). There is indicator that it is a response packet or, more generally, an ARQ packet, and this may be in the “Next Protocol Field” of the response packet 1125 .
  • the COTM terminal 115 - b then receives the response packet 1125 , and updates its ARQ table to associate the fixed terminal 110 - a with the destination IP address of the IP packet 1105 .
  • the COTM terminal 115 - b then proceeds to transmit one or more additional packets 1130 , using an existing session or creating a new one with fixed terminal 110 - a , as described above with reference to FIG. 10 .
  • a packet flow diagram 1150 illustrates the flow of packets among the COTM terminal 115 - b , a first fixed terminal 110 - b , and a second fixed terminal 110 - a of FIG. 1 , 2 , or 3 , according to an embodiment of the invention.
  • a host 1152 initially associated with the first fixed terminal 110 - b , moves to the second fixed terminal 110 - a , as had occurred in the discussion related to FIG. 11A .
  • a user packet 1155 from the host (now associated with the second fixed terminal 110 - a ) is transmitted directed at the destination IP address associated with the COTM terminal 115 - b.
  • the fixed terminal 110 - a then accesses a table (e.g., accessing table 900 of FIG. 9 using ARQ unit 225 of FIG. 2 ) to determine whether there is a terminal (and possibly a session identifier) that is associated with the destination IP address. If the COTM terminal 115 - b is the known associated terminal, and a session is available, the fixed terminal 110 - a may encapsulate the user packet to form an ARQ packet 1160 (e.g., ARQ packet 445 or 485 of FIG. 4B or 4 C), and transmit it to COTM terminal 115 - b . If not, the discovery process described above (related to FIG.
  • the ARQ packet 1160 transmitted to the COTM terminal 115 - b may be a probe packet (e.g., a probe packet 1010 of FIG. 10 ).
  • the ARQ packet 1160 reaches the COTM terminal 115 - b the ARQ table at the COTM terminal 115 - b is updated to reflect that the host IP address is now associated with fixed terminal 110 - a instead of 110 - b.
  • FIG. 12A is a flowchart illustrating a method 1200 of transmitting a terminal discovery probe packet according to various embodiments of the invention.
  • the method 1200 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a listing of associations (e.g., table 900 of FIG. 9 ) between each of a number of destination network addresses and one or more error control protocol-aware terminals is maintained.
  • a probe packet is transmitted on the routing path to the selected destination network address, the probe packet including an identifier formatted to be recognized by a terminal configured to be error control protocol-aware.
  • a response packet is received from an error control protocol-aware terminal on the routing path.
  • the listing of associations is updated with an association between the selected destination network address and the error control protocol-aware terminal.
  • FIG. 12B is a flowchart illustrating a method 1230 of receiving a terminal discovery probe packet according to various embodiments of the invention.
  • This method 1230 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a probe packet is received at a first error control protocol-aware terminal, the probe packet transmitted from a second error control protocol-aware terminal destined for an end terminal associated with a destination network address.
  • the probe packet is captured to identify the second error control protocol-aware terminal, the capture based on a probe packet identifier included in the probe packet.
  • a response packet is transmitted to the second error control protocol-aware terminal identifying the probe packet, the response packet formatted with information for the second error control protocol-aware terminal to generate an association between the destination network address and the first error control protocol-aware terminal for error control communications.
  • FIG. 12C is a flowchart illustrating a method 1250 of updating error control terminal associations according to various embodiments of the invention.
  • the method 1250 may, again, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a listing of associations is again maintained between each of a number of destination network addresses and error control protocol-aware terminals, the listing identifying one or more error control protocol-aware terminals on respective routing paths for each destination network address.
  • an entry in the listing is identified associating a selected destination network address with one of the error control protocol-aware terminals.
  • a data packet is transmitted including error control data formatted to be recognized and captured by the associated error control protocol-aware terminal, the transmission based on the identification of the entry.
  • a reachability packet is received from the error control protocol-aware terminal indicating that the selected destination network address has become unreachable from the error control protocol-aware terminal.
  • the listing of associations is updated to remove the association between the selected destination network address and the error control protocol-aware terminal.
  • FIG. 12D is a flowchart illustrating an alternative method 1280 of updating error control terminal associations according to various embodiments of the invention. As in the above examples, this method 1280 may be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a listing of associations is maintained between destination network addresses and error control protocol-aware terminals, the listing identifying a first error control protocol-aware terminal associated with a destination network address for an end terminal, the first error control protocol-aware terminal on the routing path to the end terminal.
  • a reachability packet is received from a second error control protocol-aware terminal indicating that the destination network address is reachable from the second error control protocol-aware terminal.
  • a second reachability packet may, but need not, be received from a first error control protocol-aware terminal, as well.
  • the listing of associations is updated to remove the association between the destination network address and the first error control protocol-aware terminal and add an association between the destination network address and the second error control protocol-aware terminal.
  • FIG. 13A is a flowchart illustrating a method 1300 of establishing error control communications between terminals in a mobile host environment according to various embodiments of the invention.
  • This method 1300 may, as in the above examples, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a listing of associations is maintained between destination network addresses and error control protocol-aware terminals, the listing identifying error control protocol-aware terminals on respective routing paths for each destination network address.
  • an entry in the listing is identified associating a first destination network address with a first error control protocol-aware terminal.
  • a first data packet is transmitted including error control data formatted to be recognized and captured by the first error control protocol-aware terminal, the transmission based on the identification of the entry.
  • a reachability packet is received from the first error control protocol-aware terminal indicating that the first destination network address has become unreachable is received from the first error control protocol-aware terminal.
  • the listing of associations is updated to remove the association between the first destination network address and the first error control protocol-aware terminal.
  • a probe packet is transmitted on the routing path to the first destination network address, the probe packet including a first identifier formatted to be recognized by a terminal configured to be error control protocol-aware.
  • a response packet is received from a second error control protocol-aware terminal on the routing path in response to the probe packet.
  • the listing is updated with an association between the first destination network address and the second error control protocol-aware terminal.
  • a session establishment packet is transmitted to the second error control protocol-aware terminal, the session establishment packet requesting that an error control session be established based on the content classification of a data packet to be transmitted to the first destination network address via the second error control protocol-aware terminal.
  • FIG. 13B is a flowchart illustrating a method 1350 of updating terminal associations for error control communications between terminals in a mobile host environment according to various embodiments of the invention.
  • the method 1350 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a listing of associations is maintained between network addresses and error control protocol-aware terminals, the listing identifying error control protocol-aware terminals on respective routing paths for each network address.
  • a probe packet is received from a first error control protocol-aware terminal not included in the listing, the probe packet destined for an end terminal associated with a first network address.
  • the probe packet is captured to identify the first error control protocol-aware terminal and a second network address that is the source network address, the capture based on a probe packet identifier included in the probe packet.
  • a response packet is transmitted to the first error control protocol-aware terminal, confirming receipt of the probe packet.
  • the listing of associations is updated with an association between the second network address and the first error control protocol-aware terminal.
  • the user associated with transmission from the second network address moves to be reachable from a second error control protocol-aware terminal.
  • a reachability packet is received from the second error control protocol-aware terminal indicating that the second network address is reachable from the second error control protocol-aware terminal.
  • the listing of associations is updated to remove the association between the second network address and the first error control protocol-aware terminal and to add an association between the second network address and the second error control protocol-aware terminal.
  • features of these error control mechanisms include a configurable delay limit, which may be tailored to traffic type or class.
  • TPv4 and TPv6 packets each include a one byte Type of Service (ToS) or Differentiated Services (DiffServ) field.
  • This field may be used to indicate the underlying service being transported (referred to herein as the traffic content classification).
  • the field could be used to define the delay sensitivity of the frame being transported.
  • Frames with different delay sensitivities e.g., UDP v. TCP packets, voice v. e-mail
  • multiple different ARQ sessions with differing delay limits may take place concurrently between terminals (or between a terminal and a satellite).
  • a delay limit table 1400 may be stored in memory of a terminal (e.g., the fixed terminal 110 , COTM terminal 115 , or satellite 105 of FIG. 1 ), or stored elsewhere and remotely accessed.
  • a first column includes a list of various traffic content classifications 1405 (streaming audio, streaming video, interactive audio, interactive video, and other data).
  • traffic content classifications 1405 streaming audio, streaming video, interactive audio, interactive video, and other data.
  • there are two different levels of quality of service 1410 there are two different levels of quality of service 1410 , and these may result in different delay limits. Therefore, in the illustrated embodiment, the delay limit 1415 for retransmission from a given terminal may be based on a content classification 1405 and quality of service 1410 .
  • Delay limits may be also based on load at a terminal, latency at a terminal, estimated transit time to an intermediate terminal or end user, or estimated processing time at particular devices in the routing path.
  • a packet flow diagram 1500 illustrating options for packet retransmission will be described.
  • the illustrated diagram assumes a single delay limit (thus, it may represent a single session), but the principles may be applied to a varied delay limit environment.
  • Such protocols may be used on links, for example, between a satellite 105 and a terminal ( 110 or 115 ) of FIG. 1 , or from a terminal ( 110 or 115 ) to a terminal ( 110 or 115 ) through a satellite 105 .
  • there will be a transmitter 1505 and receiver 1510 of packets although a particular device (terminal or satellite) may be both a transmitter and receiver.
  • a particular device terminal or satellite
  • the transmitter 1505 may be the COTM terminal 115 - b
  • the receiver 1510 may be the fixed terminal 110 - b
  • the transmissions may, for example, be formatted as ARQ packets 445 , 485 , 555 or control packets 470 , 495 , 575 of FIG. 4B , 4 C, or 5 B.
  • the transmissions in either direction are represented by the arrowed lines 1515 between transmitter 1505 and receiver 1510 .
  • one or more packets are identified as packets to be transmitted with appended error control data, as described above (e.g., with reference to the routing unit 220 of FIG. 2 ).
  • a packet to be transmitted is buffered and assigned a send sequence number txseq 1520 (and a delay limit may be set based on the content classification of the packet).
  • a STATREQ packet 1525 is sent by the transmitter 1505 to the receiver 1510 .
  • the STATREQ packet 1525 is sent without payload, but in other embodiments it may include a payload.
  • the intervals between each STATREQ packet 1525 may be based on the delay limit, as well.
  • This STATREQ packet 1525 may contain txTseq (the time sequence number) and txSseq (the highest sequence number sent+1).
  • the STATREQ packet 1525 is also sent whenever a certain time has elapsed (e.g., 0.1 seconds) since the last STATREQ packet 1525 was sent, and some data remains unacknowledged.
  • the STATREQ packet 1525 may also be sent when a certain amount of time (e.g., 5 seconds) has elapsed since the last STATREQ packet 1525 was sent, and no data remains unacknowledged. Note that within a round trip time, several STATREQ packets 1525 may be sent.
  • the time sequence txTseq is maintained by the transmitter 1505 , which is incremented after each STATREQ packet 1525 is transmitted.
  • the current time sequence value, txTseq may be saved locally (or, for example, at the receiver 1510 ) for each packet, when it is transmitted or retransmitted.
  • the receiver 1510 When the receiver 1510 receives an out-of-sequence packet, whose sequence number is larger (in this example, by two or more sequence numbers) than the largest sequence number received, the receiver 1510 may be triggered to buffer the out-of sequence packet and to send a USTAT packet 1530 to the transmitter 1505 , the USTAT packet 1530 identifying the rxseq (the sequence number below which all packets have been received, or discarded (because the buffering time limit expired)).
  • the USTAT packet 1530 may also provide spanlist information (sequence numbers or other information for the missing packet(s) and/or sequence numbers or other information for the received packet(s)).
  • the rxseq and spanlist may each provide acknowledgement information (making up both ACKs and NACKs).
  • the receiver 1510 When the receiver 1510 receives a STATREQ packet 1520 , it may be configured to send a STAT packet 1535 which contains rxTseq (the received time sequence number), rxseq (the sequence number below which all packets have been received), and spanlist information (sequence numbers or other information for the missing packet(s) and/or sequence numbers or other information for the received packet(s)).
  • rxTseq the received time sequence number
  • rxseq the sequence number below which all packets have been received
  • spanlist information sequence numbers or other information for the missing packet(s) and/or sequence numbers or other information for the received packet(s)
  • the transmitter 1505 When the transmitter 1505 receives a USTAT packet 1530 , it may free up buffer space (discarding the buffered data) of the acknowledged packets (and perhaps any packets for which a delay timer has expired). When the transmitter 1505 receives a USTAT packet 1535 , it may retransmit missing packets identified in the USTAT packet 1535 when the delay limit has not expired. When the transmitter 1505 receives a STAT packet 1535 , it may free up buffer space (discarding the buffered data) of the acknowledged packets (and perhaps any packets for which a delay timer has expired). The transmitter 1505 may also retransmit the missing packets identified in the STAT packet 1535 , if the delay limit has not expired.
  • the transmitter 1505 response to the STAT packet 1535 is performed only if the txTseq (the time sequence number) saved for the packet is less than or equal to the rxTseq (the received time sequence number) received in the STAT packet.
  • the receiver 1510 buffers out-of-sequence packets and delivers them in-sequence to the user network when missing packets arrive. The receiver 1510 then discards the buffered data packets. The receiver 1510 may also buffer the out-of-sequence packets until a time limit expires (or is about to expire), and then forward such packets out-of-sequence and discard them upon forwarding. This time limit for buffering may be received from the transmitter 1505 , or may be calculated based on the delay limit for the transmitter (e.g., by adding an estimated or average transit and processing time to the delay limit, in addition to a margin).
  • a buffering time limit may be calculated or set for the receiver.
  • the delay limits and time limits may take on a variety of forms, and may be calculated based on one another.
  • the discarding of buffered data packets may be accomplished by freeing memory space.
  • the transmitter 1505 may maintain a local sequence number (referred to hereinafter as “NA”), such that all packets below NA have been acknowledged by the receiver (or timed out because of the expiration of the delay timer).
  • NA a local sequence number
  • This variable may be updated by the rxSeq variable in a STAT 1535 or USTAT 1530 packet received at the transmitter.
  • a spanlist may contain a compact representation of a list of sequence numbers of missing packets and a list of sequence numbers of received out-of-sequence packets, although in other embodiments some or all of this information may be represented in alternative forms.
  • the retransmission protocol may operate in real-time mode (when certain delay limits are implemented), or may operate without delay limits in other embodiments. It is worth making a more detailed examination of embodiments in which delay limits are implemented.
  • the transmitter 1505 may be configured with certain delay limits (e.g., hereinafter identified as a delayLimit time) for a particular ARQ session that carries real-time traffic.
  • a transmitter 1505 may be configured to append a data packet header containing a field (e.g., a maxDelay field), which allows the receiver 1510 to calculate how long the packet should be buffered at the receiver 1510 .
  • the transmitter 1505 may save an arrival time for the packet, and may calculate a delay limit for retransmission (hereinafter, “delayLimit”).
  • delayLimit a delay limit for retransmission
  • the transmitter 1505 may be configured to check whether, for example, current time ⁇ packet arrival time>delayLimit. If no, then it may set the maxDelay field to delayLimit ⁇ (current time ⁇ packet arrival time), and send the packet. If yes, then the packet will not be transmitted.
  • the transmitter 1505 When the transmitter 1505 sends a STATREQ packet 1525 , it may check if there are any unacknowledged packets which have been waiting for a time equal or greater than delayLimit. If so, it may discard them (e.g., by freeing buffer space they occupy) and update NA through (or past) those packets. The NA value may be sent by the transmitter in STATREQ 1525 packets.
  • the receiver 1510 when it receives an out-of-sequence packet, it may save the maxDelay field of the packet, and the packet transmit and reception times for the packet.
  • the receiver may bump up the rxseq value to NA and deliver any out-of-sequence packets below NA to the network, freeing up the buffer space for the delivered packets.
  • the receiver 1510 may do so based on the maxDelay field of one or more of the packets.
  • a receiver 1510 may check if any out-of-sequence packets have (current time ⁇ packet transmission time)>maxDelay value of that packet. If yes, then that packet may be delivered to the network (thereby freeing up the buffer space for the delivered packets), and rxseq may be bumped up to the next missing packet.
  • FIG. 16A is a flowchart illustrating a method 1600 of setting delay limits for error control retransmissions according to various embodiments of the invention.
  • the method 1600 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a data packet is identified as a packet to be transmitted with appended error control data.
  • a delay limit is set for error control retransmissions.
  • the error control data is generated, the error control data including a time limitation for buffering of the data packet at the receiver based on the set delay limit.
  • the data packet and appended error control data are transmitted.
  • FIG. 16B is a flowchart illustrating an alternative method 1625 of setting delay limits for error control retransmissions based on traffic content according to various embodiments of the invention.
  • the method 1625 may, for example, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a number of different delay limits are established for error control retransmission, each based on traffic content classification.
  • a data packet is received.
  • the data packet is identified as a data packet to be transmitted with appended error control data.
  • the traffic content classification is identified for the first data packet.
  • a delay limit is set for error control retransmission based on the identified classification.
  • the data packet is buffered, while at block 1660 , the buffered data packet is associated with the set delay limit.
  • time is monitored for expiration of set delay limit, and incoming packets are monitored for receipt of acknowledgement packet (e.g., a USTAT packet 1530 or STAT packet 1535 of FIG. 15 ).
  • acknowledgement packet e.g., a USTAT packet 1530 or STAT packet 1535 of FIG. 15 .
  • a determination is made whether the delay limit for retransmission has expired. If not, at block 1675 , a determination is made whether an acknowledgment has been received for the data packet (e.g., from the rxseq or spanlist information of a STAT packet 1535 or a USTAT packet 1530 ). If the delay limit for retransmission has expired, or acknowledged receipt has been received for the data packet, the buffered data packet is discarded at block 1680 .
  • the missing data packet may be retransmitted if a sufficient interval has elapsed at block 1690 .
  • the processing then returns to block 1665 , where time is monitored for expiration of the set delay limit, and incoming packets are monitored for receipt of acknowledgement packets.
  • FIG. 17A is a flowchart illustrating a method 1700 of setting buffering time limits for waiting for missing packets according to various embodiments of the invention.
  • the method 1700 may, as in the above examples, be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • an out-of-sequence data packet appended to error control data is received, the error control data including data for calculating a time limit for buffering the received data packet.
  • the received data packet is buffered.
  • the time limit is processed to determine whether the time limit for buffering the received data packet has expired.
  • the buffered data packet is forwarded after the processing of the time limit.
  • FIG. 17B is a flowchart illustrating a method 1725 of setting and monitoring time limits for missing packets according to various embodiments of the invention.
  • the method 1700 may be performed in whole or in part by the COTM terminal 115 , the fixed terminal 110 , or the satellite 105 of FIG. 1 , 2 , or 3 .
  • a data packet appended to error control data is received, the error control data including a sequence number and a time limit for buffering the received data packet.
  • the received data packet is identified as an out-of-sequence data packet.
  • the received data packet is buffered (note, in one embodiment in-sequence packets are simply forwarded and discarded, without waiting for missing packets).
  • time is monitored for expiration of the time limit, and received packets are monitored for missing packets.
  • the request for retransmission may be sent if a sufficient time for buffering remains.
  • the processing then returns to block 1745 , where time is monitored for expiration of the time limit, and incoming packets are monitored for missing packets.
  • the embodiments may be described as a process which is depicted as a flow diagram or block diagram. Although each may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged. A process may have additional steps not included in the figure.
  • the term “memory” or “memory unit” may represent one or more devices for storing data, including read-only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices or other computer-readable mediums for storing information.
  • ROM read-only memory
  • RAM random access memory
  • magnetic RAM magnetic RAM
  • core memory magnetic disk storage mediums
  • optical storage mediums flash memory devices or other computer-readable mediums for storing information.
  • computer-readable medium includes, but is not limited to, portable or fixed storage devices, optical storage devices, wireless channels, a sim card, other smart cards, and various other mediums capable of storing, containing, or carrying instructions or data.
  • embodiments may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof.
  • the program code or code segments to perform the necessary tasks may be stored in a computer-readable medium such as a storage medium. Processors may perform the necessary tasks.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Astronomy & Astrophysics (AREA)
  • Aviation & Aerospace Engineering (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Detection And Prevention Of Errors In Transmission (AREA)
  • Radio Relay Systems (AREA)
  • Radio Transmission System (AREA)
  • Selective Calling Equipment (AREA)

Abstract

Systems, methods, and devices for novel error detection and retransmission processes are described. These processes may be implemented on intermediate communication links between two end terminals, wherein the intermediate links are via satellite. Error control mechanisms to detect and retransmit lost or corrupted frames may be implemented at the network layer, or between the network and data link layers. Processes for discovering error control protocol-aware terminals are described. Features of these error control processes may include a configurable delay limit, tailored to traffic type or class.

Description

CROSS REFERENCE
This Application claims priority from U.S. Provisional Patent Application No. 60/886,349, filed on Jan. 24, 2007, entitled “ENHANCED ERROR CONTROL MECHANISMS FOR SATELLITE COMMUNICATIONS”. It is related to U.S. patent application Ser. No. 11/298,612, filed Dec. 12, 2005, entitled “TRANSMISSION CONTROL PROTOCOL WITH PERFORMANCE ENHANCING PROXY FOR DEGRADED COMMUNICATION CHANNELS”. This Application hereby incorporates by reference the content of the aforementioned Applications in their entirety, and for all purposes.
BACKGROUND
The present invention relates to error control for communications in general and, in particular, to error control enhancements for satellite communications.
In wireless communications, there are a number of conditions that may impair particular links. These conditions include weather, interference, jamming, and congestion. However, the effects of these conditions may be mitigated by various techniques known in the art, including FEC (Forward Error Correction), interleaving, variable coding and modulation, power control, QoS (Quality of Service), and queueing/scheduling algorithms.
However, in certain instances, there may be conditions that are not sufficiently mitigated by the above listed techniques. For example, in satellite communications, nuclear scintillation and “communications on the move” (COTM) related impairments may result in packet losses or other errors that are not sufficiently cured by such techniques. This may be particularly true in urban areas, where man-made structures (e.g., buildings, bridges, etc.) may impede signals as COTM terminals move about. Such blockages may negatively affect communications performance in terrestrial wireless systems also. There are, thus, a variety of instances when nuclear scintillation, COTM, and other impairments may block or severely degrade signals. It may, therefore, be desirable to identify novel error detection and retransmission strategies in order to address these impairments, and moreover to handle these issues for various types and classes of service.
SUMMARY
Novel error detection and retransmission systems, methods, devices, and software are described. These processes may be implemented on intermediate communication links between two end terminals, wherein the intermediate links are via satellite. Error control mechanisms to detect and retransmit lost or corrupted frames may be implemented at the network layer. Processes for discovering and updating error control protocol-aware terminals are described, as well. Features of these error control processes may include a configurable delay limit, tailored to traffic type or class.
In one set of embodiments, various methods and systems for discovering and updating ARQ-aware terminals are described. A transmitting terminal with an ARQ unit receives an IP packet with a destination IP address. The transmitting terminal may not be aware of the correspondence between the destination IP address and the particular receiving terminal (and associated ARQ unit). The transmitting terminal sends a probe packet with an ARQ identifier to the destination IP address, and the receiving terminal intercepts the probe using the identifier. The receiving terminal responds, and the ARQ table for each terminal is updated. Other methods and systems are also described for updating ARQ tables. When users move between terminals, the ARQ tables in the terminals identifying their location may be updated to allow continued error control between terminals in a mobile environment.
For one such embodiment, an example of a system for discovering an ARQ-aware terminal on a routing path to a first destination network address is described. A first ARQ-aware terminal maintains a listing of associations between each of a number of different destination network addresses and corresponding ARQ-aware terminals. The first ARQ-aware terminal processes a data packet to be forwarded to the first destination network address, but determines that the first destination network address is not associated in the listing with an ARQ-aware terminal. The first terminal may transmit a probe packet on the routing path to the first destination network address, the probe packet including an identifier formatted to be recognized by an ARQ-aware terminal. A second ARQ-aware terminal on the routing path between the first ARQ-aware terminal and the end terminal captures the probe packet based on the identifier. The second ARQ-aware terminal transmits a response packet identifying itself and the probe packet, the response packet including information for updating the listing of associations with an association between the first destination network address and the second ARQ-aware terminal.
BRIEF DESCRIPTION OF THE DRAWINGS
A further understanding of the nature and advantages of the present invention may be realized by reference to the following drawings. In the appended figures, similar components or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label by a dash and a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description is applicable to any one of the similar components having the same first reference label irrespective of the second reference label.
FIG. 1 is a block diagram of a satellite communications system configured according to various embodiments of the invention.
FIG. 2 is a block diagram of a satellite communications system, illustrating selected devices and components for terminal to terminal communication, configured according to various embodiments of the invention.
FIG. 3 is a block diagram of a satellite communications system, illustrating selected devices and components for satellite to terminal communication, configured according to various embodiments of the invention.
FIG. 4A is a block diagram illustrating an example of the protocol layering for certain packet formatting occurring on a series of links according to various embodiments of the invention.
FIG. 4B is a block diagram illustrating an example of the frame structure for certain error control transmissions at the network layer according to various embodiments of the invention.
FIG. 4C is a block diagram illustrating an alternative example of the frame structure for certain error control transmissions at the network layer according to various embodiments of the invention.
FIG. 5A is a block diagram illustrating an example of the protocol layering for certain packet formatting occurring between HAIPE terminals according to various embodiments of the invention.
FIG. 5B is a block diagram illustrating an example of the frame structure for certain error control transmissions at the network layer between HAIPE terminals according to various embodiments of the invention.
FIG. 6 is a block diagram illustrating an example of the frame structure for certain error control transmissions between the network layer and the data link layer according to various embodiments of the invention.
FIG. 7A is a flowchart illustrating a method of transmitting error control information to a receiving terminal according to various embodiments of the invention.
FIG. 7B is a flowchart illustrating a method of transmitting error control information and managing associated buffers according to various embodiments of the invention.
FIG. 8A is a flowchart illustrating a method of receiving and responding to error control information from a transmitting terminal according to various embodiments of the invention.
FIG. 8B is a flowchart illustrating a method of receiving and responding to error control information and managing associated buffers according to various embodiments of the invention.
FIG. 9 is a block diagram illustrating a table associating destination network addresses with error control terminals according to various embodiments of the invention.
FIG. 10 is packet flow diagram illustrating a terminal discovery process between two terminals according to various embodiments of the invention.
FIG. 11A is packet flow diagram illustrating a terminal discovery process for a mobile host environment according to various embodiments of the invention.
FIG. 11B is packet flow diagram illustrating an alternative terminal discovery process for a mobile host environment according to various embodiments of the invention.
FIG. 12A is a flowchart illustrating a method of transmitting a terminal discovery probe packet according to various embodiments of the invention.
FIG. 12B is a flowchart illustrating a method of receiving a terminal discovery probe packet according to various embodiments of the invention.
FIG. 12C is a flowchart illustrating a method of updating error control terminal associations according to various embodiments of the invention.
FIG. 12D is a flowchart illustrating an alternative method of updating error control terminal associations according to various embodiments of the invention.
FIG. 13A is a flowchart illustrating a method of establishing error control communications between terminals in a mobile host environment according to various embodiments of the invention.
FIG. 13B is a flowchart illustrating a method of updating terminal associations for error control communications between terminals in a mobile host environment according to various embodiments of the invention.
FIG. 14 is a block diagram illustrating a table associating different types of traffic content with delay limits for error control terminals according to various embodiments of the invention.
FIG. 15 is packet flow diagram illustrating a range of options for packet retransmission according to various embodiments of the invention.
FIG. 16A is a flowchart illustrating a method of setting delay limits for error control retransmissions according to various embodiments of the invention.
FIG. 16B is a flowchart illustrating a method of setting delay limits for error control retransmissions based on traffic content according to various embodiments of the invention.
FIG. 17A is a flowchart illustrating a method of setting buffering time limits at receiving terminals according to various embodiments of the invention.
FIG. 17B is a flowchart illustrating a method of setting and monitoring time limits for missing packets at receiving terminals according to various embodiments of the invention.
DETAILED DESCRIPTION OF THE INVENTION
Novel error detection and retransmission processes for communication systems are described. In certain embodiments, these processes are implemented on intermediate communication links between two end terminals, wherein the intermediate links are via satellite. In one set of embodiments, error control mechanisms to detect and retransmit lost or corrupted frames are implemented at the network layer. In another set of embodiments, processes for discovering and updating error control protocol-aware terminals are described. In a third set of embodiments, features of these error control processes include a configurable delay limit, which may be tailored to traffic type or class.
This description provides example embodiments only, and is not intended to limit the scope, applicability, or configuration of the invention. Rather, the ensuing description of the embodiments will provide those skilled in the art with an enabling description for implementing embodiments of the invention. Various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the invention.
Thus, various embodiments may omit, substitute, or add various procedures or components as appropriate. For instance, it should be appreciated that in alternative embodiments, the methods may be performed in an order different than that described, and that various steps may be added, omitted, or combined. Also, features described with respect to certain embodiments may be combined in various other embodiments. Different aspects and elements of the embodiments may be combined in a similar manner.
It should also be appreciated that the following systems, methods, and software may individually or collectively be components of a larger system, wherein other procedures may take precedence over or otherwise modify their application. Also, a number of steps may be required before, after, or concurrently with the following embodiments.
Systems, methods, devices, and software are described for novel error control communications to detect and retransmit lost or corrupted frames in a communications system. Referring to FIG. 1, a block diagram is shown illustrating a satellite communications system 100 with various links 120 in which the error control communications described herein may be implemented. The system 100 includes a satellite 105, in communication with various fixed terminals 110 and COTM terminals 115.
In some embodiments, one or more of the error control processes are implemented in the network layer of a link 120-d between a satellite 105 and a COTM terminal 115-c (in either direction). In another embodiment, the error control processes are implemented in the network layer of a link 120-b between a first COTM terminal 115-a and a second COTM terminal 115-b. In a related embodiment, the error control processes are implemented in the network layer of a link 120-c between a COTM terminal 115-b and a fixed terminal 110-b (in either direction). These error control processes may be implemented in links (not shown) between two fixed terminals 110, between a satellite 105 and fixed terminal 110, or other combinations, as well. It is also worth noting that these error control mechanisms may be implemented within a network layer carrying encrypted data that is transported via IP tunneling. In some embodiments, the error control processes described herein are implemented between the network and data link layers. In still other embodiments, aspects of the error control communications (e.g., delay limits) described herein may be implemented at the data link or transport layers.
For purposes of the following discussion, the terms “transmitter” and “receiver” are used, but it is worth noting the above links may be bi-directional, so a given terminal may be both a transmitter and receiver simultaneously. For purposes of implementing certain embodiments of the invention, terminals include “ARQ units,” which may be integrated processing units at a terminal allowing a terminal to create, transmit, and identify the error control packets described herein, and engage in the ARQ sessions described. The ARQ units may buffer data from ARQ packets at the transmit end until reception is confirmed or a timeout occurs.
The error control processes described herein may be made up of error control techniques to identify lost or damaged packets, and then retransmit identified packets if an applicable delay timer has not expired. As noted above, such error control techniques may be referred to herein as ARQ error control mechanisms, or simply as ARQ. In one embodiment, packets are retransmitted only in response to specific NACKs identifying a missing packet or set of packets. In another embodiment, a hybrid scheme is used which is made up of a generalized retransmission strategy, in which selective retransmission and Go-Back-N retransmission are two particular cases. An entire spectrum of behaviors between selective retransmission and Go-Back-N can be realized by suitably configuring the size of buffers available at the receiver for saving out-of-sequence packets, and otherwise setting forth parameters for detection and transmission based on a variety of factors. The receiver saves received packets in a buffer (e.g., for an amount of time associated with the delay limit), and thereby allows for delivery of packets in sequence even when they are received out of order.
In one set of embodiments, various methods and systems for discovering error control protocol-aware terminals are described. A transmitting terminal with an ARQ unit receives an IP packet with a destination IP address. The transmitting terminal may not be aware of the correspondence between the destination IP address and the particular receiving terminal (and associated ARQ unit). The transmitting terminal may send a probe packet with an ARQ identifier to the destination IP address, and the receiving terminal intercepts the probe using the identifier. The receiving terminal responds, and the ARQ table for each terminal is updated. Methods and systems are also described for updating ARQ tables. When users move between terminals, the ARQ tables in the terminals identifying their location may be updated to allow continued error control between terminals in a dynamic environment.
In one set of embodiments, features of these error control mechanisms include a configurable delay limit tailored to traffic type or class. TPv4 and TPv6 packets each include a one byte Type of Service (ToS) or Differentiated Services (DiffServ) field. As will be discussed in greater detail below, this field may be used to indicate the underlying service being transported. For example, the field could be used to define the delay sensitivity of the frame being transported. Frames with different delay sensitivities (e.g., UDP v. TCP packets, voice v. e-mail) may then be configured with different delay limits at the transmitter, along with related time limits for buffering at the receiver. Using varied delay limits, multiple different ARQ sessions with differing delay limits may take place concurrently between terminals (or between a terminal and a satellite).
A receiver may be configured to transmit NACKs (and, possibly, ACKs) on a periodic basis. A receiver may receive a polling request (e.g., a status request) from a transmitter to initiate the transmission, or may initiate the NACKs internally. The internally or externally initiated polling period may be configurable based on a number of factors (e.g., particular terminals involved, estimated RTT, network error rate, link load, receipt of out-of-sequence packets, type or quality of service, etc.). In one embodiment, the polling period may be decreased (i.e., increasing the regularity of the ACK/NACK transmissions) when traffic is light. In another embodiment, retransmission is based only on NACKs, and this may decrease the number of unnecessary retransmissions.
In other embodiments, progressive retransmission schemes may be used under severely degraded link conditions. Progressive transmission is a process which may be used if a given frame is unsuccessfully transmitted a certain number of times (e.g., 3 unsuccessful transmissions). After this threshold is reached, more than one copy of the frame is transmitted, with the retransmitted frames spaced in time. This progressive retransmission puts additional burden on bandwidth, but may be useful in severely degraded link environments in lighter traffic periods. The threshold, the number of packets retransmitted, and the timing increments may be configurable.
Referring to FIG. 2, a block diagram is shown illustrating an example configuration 200 for certain devices of the satellite communications system 100 of FIG. 1. While the example configuration illustrates communication between a COTM terminal 115 and fixed terminal 110, those skilled in the art will recognize that similar components may be used between other links for the same or other types of terminals, or between a satellite and a terminal.
In one embodiment, an initiating terminal 205 (e.g., a user device or terminal, or a server) transmits data via a network (e.g., the Internet or a wireless local area network (LAN)) to the COTM terminal 115-b. The data is received by the COTM terminal 115-b. The COTM terminal 115-b is made up of a network layer processing unit 215 (including a routing unit 220, an ARQ unit 225 and an IP Encapsulation Unit 230), a data link layer processing unit 235, an RF frontend 240, and other components known in the art. The received data may, for example, be an IP packet carried by a wireless signal.
After some intermediate processing by other components (not shown) of the COTM terminal 115-b, the IP packet may be received by the routing unit 220 of the network layer processing unit 215. The routing unit 220 may evaluate the destination address of the received IP packet, and recognize that it will be forwarded to a similar error control protocol-aware terminal, such as fixed terminal 110-b (e.g., through the satellite 105 via link 120-c). This lookup functionality may be achieved by having the routing unit 220 maintain or otherwise access a table that lists certain destination IP or other addresses that are associated with ARQ units. Thus, the routing unit 220 may make a threshold determination as to whether the IP packet is directed to or through a node that can engage in an ARQ session at the IP layer, as described herein.
Instead of simply encapsulating the received IP packet and forwarding it to the data link layer processing unit 235, the network layer processing unit 215 may assign processing responsibilities for the received IP packet to an ARQ unit 225. The ARQ unit 225 may create an ARQ header to be associated with the received IP packet, the ARQ header including sequence number, session number, a timestamp, a retransmission delay limit, buffering time limits for a receiving terminal, and other information and/or identifiers for error detection. The ARQ unit 225 may evaluate a Type of Service indicator in the received IP packet, and place the packet in the appropriate session based on the type of service (e.g., UDP v. TCP). In this way, packets with different delay sensitivities or quality of service guarantees may have different delay timers, buffer or window sizes, polling timers, etc. The ARQ unit 225 may buffer the data packet to be transmitted until acknowledgement information is received and/or processed to determine whether the data packet was received. The ARQ unit 225 may buffer the data packet (allowing for possible retransmission) until a delay timer expires, and then discard the packet.
An IP encapsulation unit 230 may then encapsulate the ARQ header in an additional IP header, and append its associated IP packet, indicating in this IP header that it is an ARQ IP packet. The indicator in the additional IP header may be used as a signal to other error control protocol-aware terminals that the packet includes an ARQ header and is to be processed by a receiving ARQ unit at the network layer. As used herein, the terms “error control protocol-aware terminal” or “network layer error control protocol-aware terminal” may describe a terminal configured with an ARQ unit similar to ARQ unit 225, and located on the routing path to a destination network address. The IP encapsulation unit 230 may forward the ARQ packet to the data link layer processing unit 235, where a data link protocol (e.g., HDLC) is applied. The link layer packet is then processed by RF frontend 240, and transmitted via a wireless signal through the satellite 105 to the fixed terminal 110-b.
The fixed terminal 110-b receives the signal. The fixed terminal 110-b in this embodiment is made up of an RF frontend 245, data link layer processing unit 250, and a network layer processing unit 255 (including an IP decapsulation unit 260, routing unit 265, and ARQ unit 270). Its RF frontend 245 may downconvert, amplify, and demodulate the signal, thereby reproducing the link layer packet from the COTM terminal 115-b. In cases where the satellite provides IP routing functionality but no ARQ functionality, the received link layer packet header is generated by the satellite. The data link layer processing unit 250 of the fixed terminal 110-b may process the received packet, as known in the art, to produce the ARQ IP packet. An IP decapsulation unit 260 may receive the ARQ IP packet, process the identifier in the header to recognize the packet as an ARQ IP packet, and forward it to the ARQ unit 270 for processing.
The ARQ unit 270 of the receiving fixed terminal 110-b may analyze a sequence number, timestamp, retransmission delay limit, time limit for buffering, and any additional error control information from the ARQ header created by the ARQ unit 225 of the COTM terminal 115-b. The ARQ unit 270 of the fixed terminal 110-b may analyze this error control information, in light of other ARQ packets received from the session, and transmit acknowledgement information (ACKs, NACKs, and/or other status information) to the ARQ unit 225 of the COTM terminal 115-b. The ARQ unit 270 of the fixed terminal 110-b may generate a response packet with the acknowledgement information in response to the received error control header, and the acknowledgement information may be encapsulated at the network layer. The response packet may be forwarded to the data link layer processing unit 250, where a data link protocol (e.g., HDLC) is applied. The link layer packet is then processed by RF frontend 245, and transmitted via a wireless signal through the satellite 105 back to the ARQ unit 225 of the COTM terminal 115-b. The COTM terminal 115-b, upon receiving acknowledgement information that includes a NACK, may retransmit the buffered data packets (perhaps on the condition that time remains for an applicable delay limit).
The ARQ unit 270 of the receiving fixed terminal 110-b may determine that the data packet is an out-of-sequence data packet, and buffer the packet until preceding data packets are received and forwarded to the end terminal (or a time limit based on a delay limit expires). The ARQ unit 270, in one embodiment, may wait to forward the buffered data packet to the end terminal until determining the data packet has become an in-sequence data packet, and that the intervening packets have been forwarded. In one embodiment, a buffered data packet may be retained until a buffering time limit is exceeded or neared (e.g., when a discard or forwarding time is specified for immediately before the time limit expires). In such instances, the buffered data packet may then be forwarded out-of-sequence and then discarded. (Note that if the IP decapsulation unit 260 identified the packet as a non-ARQ IP packet, other components (not shown) of the network layer processing unit 255 of the fixed terminal 110-b may otherwise process the packet at the IP layer).
Once the ARQ unit 270 processing is underway or completed, other components may further process and/or forward the packet out of the fixed terminal 110-b. The data which originated at initiating terminal 205, and was routed through the COTM terminal 115-b, satellite 105, and fixed terminal 110-b, may then be passed through a network 210 to an end terminal 275. The initiating terminal 205 and the end terminal 275 may each be remote from the COTM terminal 115-b and fixed terminal 110-b, thus the link may be an intermediate link within the end to end connection. In addition to the above described error control procedures, it is worth mentioning that the initiating terminal 205 may also buffer the first data packet until an acknowledgement is received from the end terminal 275 (e.g., using a distinct TCP connection to provide multiple error control links). Although the above description is directed at a link between a COTM terminal 115 and a fixed terminal 110, a similar process and components may be applied to other terminal to terminal, or satellite to terminal connections, as well.
A number of alternative embodiments are available, as well. For example, referring to FIG. 3, a block diagram is shown illustrating an example configuration 300 of components for the satellite communications system 100 of FIG. 1. The diagram illustrates certain differences from the terminal-to-terminal processing described above. Note that in this embodiment the ARQ unit is located on the satellite 105, which communicates with a COTM terminal 115-c over link 120-d. The satellite 105 includes an ARQ unit 305, a data link layer processing unit 310, a transmitter 315, and may include other components known in the art.
In one embodiment, data is received by the satellite, perhaps from a fixed terminal 110. The received data may, for example, include an IP packet carried by a wireless signal. After some intermediate processing, the IP packet may be received by the ARQ unit 305. The ARQ unit 305 may evaluate a destination (IP or other) address associated with the received IP packet, and recognize that it will be passing through the ARQ-aware COTM terminal 115-c, via link 120-d. This lookup functionality could be achieved by having the ARQ unit 305 maintain or otherwise access a table that lists MAC addresses or other terminal addresses that are associated with ARQ units capable of ARQ sessions according to particular embodiments of the invention.
Instead of simply passing the received IP packet to the data link layer processing unit 310, the ARQ unit 305 may create an ARQ header to be associated with the received IP packet, the ARQ header including a sequence number, a session identifier, a timestamp, time and/or delay limits, and other information for error detection. The ARQ unit 305 may place the packet in an appropriate session based on the type of service (e.g., real-time interactive v. email). In this way, packets with different delay sensitivities or quality of service guarantees may have different delay timers, buffer or window sizes, polling timers, etc., and these parameters may be isolated to the satellite to terminal links.
The ARQ unit 305 may forward the ARQ header and associated IP packet to the data link layer processing 310 unit, where a data link protocol (e.g., HDLC) is applied, encapsulating the ARQ header and associated IP packet. Thus, in this embodiment, the error control data is located between the network and data link layers. The link layer packet is then processed by the transmitter 315, and sent via a wireless signal through the satellite 105 to the COTM terminal 115-c.
The COTM terminal 115-c receives the signal. The COTM terminal 115-c in this embodiment is made up of an RF frontend 245, a data link layer processing unit 250, an ARQ unit 320, and a network layer processing unit 255 (including an IP decapsulation unit 260). Its RF frontend 245 may downconvert, amplify, and demodulate the signal, thereby producing the link layer packet from the satellite 105. The data link layer processing unit 250 of the COTM terminal 115-c may process the received packet, as known in the art, to produce the ARQ header and associated IP packet. The data link layer processing unit 250 may recognize an identifier in the data link layer header, and forward the packet to the ARQ unit 320 for processing. The ARQ unit 320 may analyze the sequence number, timestamp, and other information, in light of other ARQ packets received from the session. The ARQ unit 320 may then transmit ACKs, NACKs, and other status information to the ARQ unit 305 of the satellite 105. Once the ARQ unit processing is complete, a network layer processing unit 255 may receive the IP packet, and the IP decapsulation unit 260 may process the packet as a regular IP packet, and forward the packet out of the COTM terminal 115-c (e.g., the packet, without its ARQ header, may be processed by the IP decapsulation unit 260). Other components may further process and/or forward the packet out of the COTM terminal 115-b, to then be passed through a network 210 to an end terminal 275.
Thus, while in some embodiments the error control data may be encapsulated at the network layer, in other embodiments the error control data may be encapsulated between the network layer and data link layers. In still other embodiments, certain aspects of the error control protocols described herein may be implemented at the data link layer or transport layer, for example. Moreover, although the description with reference to FIG. 3 is directed at a link from a satellite 105 to a COTM terminal 115, the session at issue may also be from the COTM terminal 115 to the satellite 105, wherein the ARQ header formatting is applied at the COTM terminal 115, and then received and processed at the satellite 105. According to the embodiment described with reference to FIG. 3, the satellite 105 may, therefore, operate as a receiver and transmitter for the same IP packet (e.g., with a COTM terminal 115-a to satellite 105 link, and then from the satellite 105 to COTM terminal 115-b link). Also, although the above description is directed at the link between a satellite 105 and COTM terminal 115, a similar process and components may be applied to other satellite 105 to fixed terminal 110 links 120-a, as well, or in a number of other terminal to terminal connections.
It is worth noting that the components of a fixed terminal 110, COTM terminal 115, or satellite 105 of FIG. 2 or 3 may be implemented, in whole or in part, in hardware. Thus, they may each be made up of one, or more, Application Specific Integrated Circuits (ASICs) adapted to perform a subset of the applicable functions in hardware. Alternatively, the functions may be performed by one or more other processing units (or cores), on one or more integrated circuits. In other embodiments, other types of integrated circuits may be used (e.g., Structured/Platform ASICs, Field Programmable Gate Arrays (FPGAs), and other Semi-Custom ICs), which may be programmed in any manner known in the art. Each may also be implemented, in whole or in part, with instructions embodied in a memory, formatted to be executed by one or more general or application specific processors. The tables described above may be stored in local memory.
Referring to FIG. 4A, a block diagram is shown illustrating an example of the protocol layering for certain packet formatting 400 occurring on a series of links between two users 205, 275. In one embodiment, an intermediate link 120 (e.g., from the system 100 of FIG. 1) is between a COTM terminal 115 and a fixed terminal 110. FIG. 4A illustrates the physical layer 404, data link layer 408, network layer 412, and transport and application layer 416 processing that may occur at each user terminal 205, 275, HAIPE terminal 402, intermediate terminal 110, 115, or satellite 105. FIG. 4A also illustrates how the ARQ error control data may be created at the COTM terminal 115 IP layer 420, and be processed at the IP layer 424 by the receiving fixed terminal 110. In these embodiments, therefore, ARQ operates over a terminal to terminal IP tunnel. In other embodiments, the illustrated packet formatting may take place between other terminal to terminal or terminal to satellite connections.
Referring next to FIG. 4B, a block diagram is shown illustrating an example of the frame structure 425 for various embodiments of the invention. This may, for example, be the frame format generated at the COTM terminal 115, as set forth the FIG. 4A. Thus, in this embodiment, a COTM terminal 115 may receive a HAIPE encrypted IP packet 430 encapsulated by an unencrypted IP header 435-a, thereby forming a payload made up of an IP packet 440 (note that in other embodiments, other types of packets could be received or otherwise created at the COTM terminal 115 to form the payload; e.g., the payload could be an IP packet encapsulating an IPSEC encrypted packet, or some other IP packet carrying an unencrypted payload).
In this embodiment, the COTM terminal 115 includes an ARQ unit (e.g., the ARQ unit 225 shown in FIG. 2) configured to encapsulate the received IP packet 440 to form an expanded IP packet 445 (or, in other embodiments, this may be some other network layer packet format). This expanded IP packet 445 contains a second outer IP header 450 with a field indicating that it is an ARQ packet and specifying the IP address (e.g., for an end user 275). The IP packet 445 also includes an ARQ header 455 (e.g., a 4 byte ARQ header) which may contain a sequence number, a timestamp, session number, and other information for error detection. The expanded IP packet 445 is then encapsulated in an HDLC header 460 (or other data link layer protocol), to form a data link layer HDLC packet 465. This packet is then transported, via the satellite, to the fixed terminal 110, which includes another ARQ unit (e.g., the ARQ unit 270 at the fixed terminal 110-b shown in FIG. 2). The fixed terminal 110 processes the IP header 450 for the expanded IP packet 445 and, recognizing that it is an ARQ packet, forwards it to an ARQ unit therein.
The ARQ unit at the fixed terminal 110 may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer. In this way, the ARQ processing units at the COTM terminal 115 and the fixed terminal 110 may perform the error control functionality at the IP layer via the satellite 105. The ARQ unit (e.g., ARQ unit 270) at the receiving fixed terminal 110 may respond with acknowledgement information (ACKs, NACKs, or other status reports) or session initiation responses transmitted at the network layer to the ARQ unit (e.g., ARQ unit 225) at the transmitting COTM terminal 115.
In this embodiment, the payload 440 need not be aware of the ARQ functionality. The data link layer (i.e., the HDLC layer) need not be aware of this functionality, either. The ARQ unit at the COTM terminal 115 may retransmit lost or damaged packets after receiving the appropriate ACKs or NACKs, if the delay limit (as applicable) is not exceeded given the applicable type of service. The ARQ unit (e.g., ARQ unit 225 or 270) may be configured to apply the additional IP layer (420, 424) only when a packet is destined for a terminal with an ARQ unit with IP layer functionality. In this embodiment, the COTM terminal 115 may maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once.
Note that a format for a control packet 470 is illustrated as well, which may be sent on forward or reverse links. In other embodiments, the ARQ unit may be implemented in a box outside of the COTM terminal (e.g., between the HAIPE terminal and COTM terminal). In still other embodiments, the terminal to terminal link may be between fixed terminals 110, COTM terminals 115, or any alternative combination thereof.
Referring next to FIG. 4C, a block diagram is shown illustrating an alternative example of the frame structure 475 for various embodiments of the invention. This may, for example, be the frame format processed between terminals (e.g., the terminals 110, 115 set forth in FIG. 4A). Thus, in this embodiment, assume a COTM terminal 115 again receives a HAIPE encrypted IP packet 430 appended to an unencrypted IP header 435-b, thereby forming a payload made up of an IP packet 440 (again note that in other embodiments, other types of packets could be received or otherwise created at the COTM terminal 115 to form the payload, e.g., the payload could be an IP packet encapsulating an IPSEC encrypted packet, or some other IP packet carrying an unencrypted payload).
In this embodiment, the COTM terminal 115 includes an ARQ unit (e.g., ARQ unit 225 of FIG. 2) configured to insert or otherwise include an ARQ header 480 (e.g., a 4 byte ARQ header) between the unencrypted IP header 435-b and the ESP header. The ARQ header may contain a sequence number, a timestamp, session number, and other information for error detection. The expanded IP packet 485 is then encapsulated in a HDLC header 460 (or other data link layer protocol) to form a data link layer HDLC packet 490. This packet is then transported, via the satellite 105, to the fixed terminal 110, which includes another ARQ unit (e.g., the ARQ unit 270 shown in FIG. 2).
The fixed terminal 110 processes the IP header 435-b for the expanded IP packet 485 and, recognizing that it is an ARQ packet (because it is so indicated in the header), forwards it to its ARQ unit therein. The ARQ unit at the fixed terminal 110 may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer. Response or other acknowledgement packets may similarly be transported in the reverse direction at the IP layer, as well. In this way, the ARQ protocol described herein may operate in non-tunneled mode, and the ARQ overhead may be decreased from an extra 40 bytes (e.g., with IPv6) to an extra four bytes in this example.
Thus, in this embodiment, the encrypted payload 430 need not be aware of the ARQ functionality. The data link layer (i.e., the HDLC layer) need not be aware of this functionality, either. The ARQ unit at the COTM terminal 115 may retransmit lost or damaged packets after receiving the appropriate ACKs or NACKs, if the delay limit is not exceeded given the applicable type of service. An ARQ unit (e.g., ARQ unit 225 or 270) may be configured to insert the ARQ header 480 only when a packet is destined for a terminal with an ARQ unit with IP layer functionality. The COTM terminal 115 may again maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once. Note that a format for a control packet 495 is illustrated as well, which may be sent on forward or reverse links.
Turning next to FIG. 5A, a block diagram is shown illustrating an example of certain packet formatting 500 which occurs on a series of links between two users 205, 275. An intermediate link 530 is illustrated. The communication passes from a user 205, through a HAIPE terminal 520-a (which includes an ARQ unit), a first intermediate terminal 115, a satellite 105, a second intermediate terminal 110, and then on through a second HAIPE terminal (which includes an ARQ unit) 520-b. FIG. 5A illustrates the physical layer 504, data link layer 508, network layer 512, and transport and application layer 516 processing that occurs at each device or set of devices. FIG. 5A illustrates how the ARQ error control frame may be created at the IP layer 524 by a HAIPE terminal 528 outside of the intermediate terminal-to-terminal connections described above, passing in encrypted form through the intermediate terminals and satellite, and be processed at the IP layer 528 of a receiving HAIPE terminal 520-b. In other embodiments, the illustrated packet formatting may take place with one, or more, other types of terminals outside of the terminal to satellite to terminal connections described above.
Referring next to FIG. 5B, a block diagram is shown illustrating an example of a frame structure 535 for various embodiments of the invention. For purposes of example, assume that the terminals of FIG. 5A are in use. In this embodiment, a HAIPE terminal HAIPE terminal 524 receives an unencrypted IP packet 540. The HAIPE terminal 524 may evaluate the destination address of the received IP packet and recognize that it will be forwarded to a similar ARQ aware HAIPE terminal 528 (through the satellite 105). This lookup functionality could be achieved by having an ARQ unit in the HAIPE terminal maintain or otherwise access a table that lists certain IP or other addresses that are associated with ARQ units.
In this embodiment, the HAIPE terminal 520-a includes an ARQ unit configured to append or otherwise associate an ARQ header 545 (e.g., a 4 byte ARQ header) onto the IP packet 540. The ARQ header 545 may contain a sequence number, a timestamp, session number, and other information for error detection. The expanded packet is then encapsulated with an outer IP header 550 (or other network layer protocol), and encrypted to form an encrypted IP packet 555 with an encrypted ARQ header. The encrypted packet 555 is then encapsulated by an outer, unencrypted IP header 560. A data link layer header 565 is added, forming a data link layer packet 570 to be transported through the network with the payload 555 encrypted. This layering may be used on forward and reverse links. The intermediate terminals (fixed 110 and/or COTM 115) and satellite 105 need not be aware of the contents of the encrypted ARQ packet. The HAIPE terminal 520-b on the receiving end decrypts the packet 555, and recognizes that it is an ARQ packet (because the protocol value field therein so indicates). The HAIPE terminal forwards it to an ARQ unit therein. The ARQ unit at the HAIPE terminal 520-b may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer.
Thus, in this embodiment, the intermediate terminals need not be aware of the ARQ functionality. The ARQ unit at the transmitting HAIPE terminal 520-a may retransmit lost or damaged packets after receiving the appropriate ACKs, or NACKs from the receiving HAIPE terminal 520-b, if the delay limit is not exceeded given the applicable type of service. In this embodiment, the HAIPE terminal 520-a may maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once.
Note that a format for a control packet 575 is illustrated as well, and it may be also sent on forward or reverse links. In other embodiments, the ARQ unit at a terminal may have a number of different sessions depending on the type of service or QoS features of the packet. Different types and qualities of service may be configured to have error control sessions at different terminals. In other embodiments, the HAIPE terminal—HAIPE terminal link may be between other terminals.
As noted above, ARQ units (e.g., the ARQ units (225, 270, 320) of FIGS. 2 and 3) or other processing units in a terminal may maintain tables that link destination IP addresses (or other destination addresses) with other ARQ units. For each ARQ unit in a table, there may be an additional correspondence with a particular session number or other identifier. Thus, as an IP packet (e.g., the IP packet 440 of FIG. 4B or 4C) is received at a terminal with an ARQ unit (e.g., the ARQ unit 225 at COTM terminal 115-b of FIG. 2), a table may be accessed to identify a receiving ARQ unit corresponding to the destination IP address. A Type of Service field in the received IP packet may be accessed, and this field may be used to identify the appropriate session for the IP packet. The transmitting ARQ unit may append an outer IP header (e.g., IP header 550) and an ARQ header (e.g., 545) at the network layer, thereby encapsulating the received IP packet. A session identifier, sequence number, and other error control information may be included in the ARQ header, and the packet may thus be transmitted to the receiving ARQ unit at the IP layer. Between terminals, there may be a single session for all transmitting and receiving users. Alternatively, there may be a number of sessions, depending on type or quality of service, source or destination IP or other address, or other factors.
Referring next to FIG. 6, a block diagram is shown illustrating an example of the frame structure 600 for various embodiments of the invention. This may, for example, be the frame format processed at the satellite 105, as set forth in FIG. 3 (or used in the reverse direction). Thus, in this embodiment, a satellite 105 may receive a HAIPE encrypted IP packet 605 encapsulated by an unencrypted IP header 610, thereby forming a payload made up of an IP packet 615 (note that in other embodiments, other types of packets could be received or otherwise created at the satellite to form the payload, e.g., the payload could be an IP packet encapsulating an IPSEC encrypted packet, or some other IP packet carrying an unencrypted payload).
In this embodiment, the satellite 105 includes an ARQ unit (e.g., the ARQ unit 320 shown in FIG. 3) configured to append or otherwise include an ARQ header 620 (e.g., a 4 byte ARQ header) onto the IP packet 615. The ARQ header 620 may contain a sequence number, a timestamp, a session number, delay and/or time limits, and other information for error detection. The expanded packet 630 is then encapsulated in a HDLC header 625 (or other data link layer protocol) to form a data link layer HDLC packet 635. This packet is then transported to the terminal 110, 115, which includes another ARQ unit (e.g., the ARQ unit 320 at the COTM terminal 115-c shown in FIG. 3). The COTM terminal 115-c processes the HDLC header for the packet 635, recognizing that it is an ARQ packet (because the protocol value field therein so indicates), and forwards it to the ARQ unit. The ARQ unit at the COTM terminal 115-c may then receive and process the ARQ header, and perform the ARQ error control processes at the IP layer.
Thus, in this embodiment, the payload 615 need not be aware of the ARQ functionality. The ARQ unit at the satellite may retransmit lost or damaged packets after receiving the appropriate ACKs or NACKs, if the delay limit is not exceeded given the applicable type of service. The ARQ unit may be configured to apply the ARQ header 620 only when a packet is destined for a terminal with an ARQ unit with IP layer functionality. In this embodiment, the satellite 105 may maintain a different ARQ session for each traffic and/or QoS class at a given terminal, and may have ongoing ARQ sessions with a number of terminals at once.
Note that a format for a control packet 640 is illustrated as well, and it may be sent on forward or reverse links. In other embodiments, the ARQ unit may be implemented in a box outside of the terminal (e.g., between the HAIPE terminal and COTM terminal 115). Although the above description is directed at the link from a satellite 105 to a COTM terminal 115, the session at issue may also be from the COTM terminal 115 to the satellite 105, wherein the ARQ header formatting is applied at the COTM terminal 115, and then received and processed at the satellite 105. According to the embodiment described with reference to FIG. 3, the satellite 105 may, therefore, operate as a receiver and transmitter for the same IP packet (e.g., with a COTM terminal 115-a to satellite 105 link, and then from the satellite 105 to COTM terminal 115-b link). In other embodiments, the satellite/terminal link may be between a satellite and a fixed terminal as well.
FIG. 7A is a flowchart illustrating a method 700 of transmitting error control information to a receiving terminal according to various embodiments of the invention. The method 700 may, for example, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 705, a first data packet is processed, the first data packet destined for an end terminal via an intermediate terminal. At block 710, a first error control header is generated for the first data packet. At block 715, the first error control header is encapsulated for transmission at the network layer appended to the first data packet. At block 720, a second data packet appended to a second error control header is received, the second data packet and appended second error control header transmitted from the intermediate terminal in response to the first error control header. The second error control header is encapsulated for transmission at the network layer, and includes acknowledgement information for receipt of the first data packet.
FIG. 7B is a flowchart illustrating a method 725 of transmitting error control information and managing associated buffers according to various embodiments of the invention. The method 700 may, for example, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 730, a first data packet is received from a remotely located initiating terminal, the first data packet destined for a remote end terminal via an intermediate terminal. At block 735, a table of associations is maintained, the associations relating destination network addresses to network layer error control protocol-aware terminals. At block 740, the first data packet is identified, via the table, as a data packet that will pass through a network layer error control aware terminal, wherein the network layer error control aware terminal is the intermediate terminal.
At block 745, the first data packet is buffered. At block 750, a first error control header is generated for the first data packet. At block 755, the first error control header is encapsulated for transmission at the network layer appended to the first data packet. At block 760, the first data packet and appended first error control header are transmitted to the remotely located intermediate terminal via satellite.
At block 765, a second data packet and appended second error control header are received, the second data packet and appended second error control header transmitted from the intermediate terminal in response to the first error control header. The second error control header is encapsulated for transmission at the network layer, and includes acknowledgement information for the first data packet. At block 770, the buffered first data packet is discarded after processing the acknowledgement information from the received second error control header to determine whether the buffered data packet is to be retransmitted.
FIG. 8A is a flowchart illustrating a method 800 of receiving error control information from a transmitting terminal according to various embodiments of the invention. The method 800 may, for example, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 805, a first data packet and appended first error control header are received, the first error control header encapsulated at the network layer. At block 810, error control information in the first error control header is analyzed. At block 815, a second error control header is generated including acknowledgement information in response to the analyzed error control information. At block 820, the second error control header is encapsulated for transmission at the network layer appended to a second data packet.
FIG. 8B is a flowchart illustrating a method 825 of receiving and responding to error control information and managing associated buffers according to various embodiments of the invention. The method 825 may, for example, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 830, a first data packet appended to a first error control header is received via satellite, the first error control header encapsulated at the network layer. At block 835, the first error control header is identified as data generated by a network layer error control protocol-aware terminal, wherein the network layer error control aware terminal is a terminal between an initiating terminal and an end receiving terminal. At block 840, error control information in the first error control header is analyzed to identify the first data packet as an out-of-sequence packet.
At block 845, the first data packet is buffered based on the analysis of the first error control header indicating the first data packet is an out-of-sequence data packet. At block 850, a second error control header including sequencing and acknowledgement information (e.g., identifying received and missing packets) is generated in response to the analyzed error control information. At block 855, the second error control header is encapsulated for transmission at the network layer appended to a second data packet. At block 860, the second error control header and the appended second data packet are transmitted, via the satellite, the transmission directed to the network layer error control protocol-aware terminal.
At block 865, the buffered first data packet is forwarded to a remotely located end terminal upon determining the first data packet has become an in-sequence data packet. In other embodiments, the forwarding may occur after a buffering time expires or before a buffering time is set to expire. At block 870, the buffered first data packet is discarded after it is forwarded.
Turning to another set of embodiments, various methods, systems, and software for discovering error control protocol-aware terminals are described. A transmitting terminal with an ARQ unit typically receives a data packet with a destination network address. Referring back briefly to FIG. 2, recall that the routing unit 220 may evaluate the destination network address of the received data packet to determine whether it will be forwarded to a similar ARQ-aware fixed terminal 110-b (e.g., through the satellite 105 via link 120-c). This lookup functionality may be achieved by maintaining a listing of associations between each of a number of destination network addresses and one or more error control protocol-aware terminals. The routing unit 220 of FIG. 2, for example, may maintain or otherwise access a table in a memory that lists certain destination network addresses that are associated with ARQ units.
Referring next to FIG. 9, an example of such a table 900 is shown, associating IP addresses with network layer error control protocol-aware terminal. The left column lists a number of destination IP addresses 905, while the right column sets forth the network layer error control protocol-aware terminals 910 associated with each listed IP address. This type of table 900 may, for example, be used when an error control protocol-aware terminal (e.g., a fixed terminal 110 or COTM terminal 115 of FIG. 1 or 2) is deciding whether to perform the ARQ error control processing described herein.
The transmitting terminal may not be aware of the correspondence between the destination network address and the particular receiving terminal (and associated ARQ unit). The transmitting terminal may send a probe packet with a probe packet identifier to the destination IP address to discover such a terminal, and the receiving terminal captures the probe based on the identifier. The receiving terminal responds, and the ARQ table for each terminal is updated. Methods and systems are also described for updating ARQ tables. When users move between terminals, the ARQ tables in the terminals identifying their location may be updated to allow continued error control between terminals in a dynamic environment.
Those skilled in the art recognize the dynamic nature of many IP addresses and end users. End users may move between terminals, and terminals may have incomplete information about all IP addresses. Therefore, an example of a process will be described to discover ARQ units associated with destination IP addresses (or other addresses). FIG. 10 is a packet flow diagram 1000 illustrating an example flow of packets between the COTM terminal 115-b and fixed terminal 110-b of FIGS. 1 and 2, according to an embodiment of the invention. In other embodiments, the discovery process may occur between other error control protocol-aware terminals or nodes in a network.
The COTM terminal 115-b receives a user packet 1005 with a source and destination IP address from a user 205. The COTM terminal 115-b accesses a table (e.g., accessing table 900 of FIG. 9 using ARQ unit 225 of FIG. 2) to determine whether there is a terminal (and possibly session identifier) that is associated with the destination IP address. Not finding such an entry, the COTM terminal 115-b formats and forwards a probe packet 1010 (referred to as an ARQ-DS-REQ packet in FIG. 10). This packet 1010 may, for example, be formatted as the ARQ packet 445 or control packet 470 of FIG. 4B, with the destination IP address the same as the destination IP address of the received user packet 1005. There is an indicator in the probe IP packet 1010 that it is a probe packet (or more generally, an ARQ packet), and this indicator may be in the “Next Protocol Field” of the probe IP packet 1010 (this indicator, therefore, may be referred to herein as an “identifier” or “probe packet identifier”). This identifier is formatted to allow a next error control protocol-aware terminal to identify and capture terminal information in the probe packet 1010.
The COTM terminal 115-b may also forward the received user packet 1005 (without the error control processes described herein). It may also hold the received user packet 1005 in a buffer until the listing is updated with a receiving terminal entry for the destination network address, or until an ARQ session is established. Alternatively, the probe packet 1010 may be configured to carry the IP packet 1005 as its payload, and thus the probe packet 1010 may include the user packet 1005.
At the fixed terminal 110-b (which includes an ARQ unit, for example ARQ unit 270 of FIG. 2), the probe packet 1010 is received, and may be captured based on the identifier. The probe packet 1010 is processed, and the fixed terminal 110-b recognizes the packet as a probe packet, identifying the source IP address and the COTM terminal 115-b. The fixed terminal 110-b may then update its own ARQ table, thereby associating the source IP address with the COTM terminal 115-b. The fixed terminal formats and transmits a response packet 1015 (referred to as an ARQ-DS-Response packet in FIG. 10). This packet 1015 may be formatted as the ARQ packet 445 or 485 or control packet 470 or 495 of FIG. 4B or 4C (with the destination IP address the same as the source IP address of the received IP packet 1005, or perhaps the IP address of the COTM terminal 115-b). There is another identifier in the response packet 1015 that it is a response packet, and this indicator may be in the “Next Protocol Field” of the response packet 1015.
The COTM terminal 115-b then receives the response packet 1015, and updates its ARQ table to associate the fixed terminal 110-b with the destination IP address of the IP packet 1005. The COTM terminal 115-b (perhaps with its ARQ unit) may then access a table to determine whether there is a session corresponding to the COTM terminal 115-b to fixed terminal 110-b link, and whether that session may be applicable to the type or quality of service associated with an IP packet to be sent to over the link.
If an applicable ARQ session entry is not found for an IP packet to be sent over the link, the COTM terminal 115-b formats and forwards a session establishment IP packet 1020 (referred to as an ARQ-Open packet in FIG. 10). This packet 1020 may be formatted as the ARQ packet 445 or 485 or control packet 470 or 490 of FIG. 4B or 4C, with the destination IP address the same as the destination IP address of the user packet 1005 or the fixed terminal 110-b. The fixed terminal 110-b may then receive the session establishment packet 1020, and create a session entry associated with the content classification of the data packet (e.g., based on whether the user packet is audio or video, streaming or interactive, and on quality of service requirements, or other). The fixed terminal 110-b formats and forwards a session ACK packet 1025 (referred to as an ARQ-Open Ack packet in FIG. 10). This packet 1025 may, as above, be formatted as the ARQ packet or ARQ control packet (with the destination IP address the same as the source IP address of the user packet 1005, or perhaps the IP address of the COTM terminal 115-b). There is another identifier in the session ACK packet 1025 that it is a session initiation packet. The COTM terminal 115-b receives and processes the session ACK packet 1025, and the session is thereby established.
If it has not done so already, the COTM terminal 115-b may transmit the buffered data packet 1030 with appended error control data along the routing path toward the destination network address. The transmitted error control data may include a sequence number and an identifier to allow the fixed terminal 110-b to capture the error control data. The data packet may be integrated into the probe packet 1010, or may be received separately by the by fixed terminal 110-b. The data packet will, regardless of how it is received, be transmitted 1035 to the end terminal 275. The fixed terminal 110-b may further respond by transmitting acknowledgement information back to the COTM terminal 115-b, and the acknowledgement information may include the sequence number.
As noted above, many hosts and terminals in such a system may be mobile or otherwise dynamic, and thus it may be desirable to address the host mobility issue. As noted above, ARQ units (e.g., the ARQ units (225, 265, 305, 320) of FIGS. 2 and 3) or other processing units in a terminal may maintain tables (e.g., table 900 of FIG. 9) that link destination IP addresses (or other destination addresses) with other ARQ units. Consider, however, the movement of a user from a first terminal to a second terminal. FIG. 11A is a packet flow diagram 1100 illustrating the flow of packets between the COTM terminal 115-b a first fixed terminal 110-b, and a second fixed terminal 110-a of FIG. 1A, according to an embodiment of the invention. In other embodiments, the host mobility process may occur between other terminals or nodes in a network.
The COTM terminal 115-b receives a user packet 1105 with a source and destination IP address. The COTM terminal 115-b accesses a table (e.g., table 900 of FIG. 9 using ARQ unit 225 of FIG. 2) to determine whether there is a terminal (and possibly session identifier) that is associated with the destination IP address and packet type. Finding such an entry, the COTM terminal 115-b formats and forwards a modified user packet 1110 (e.g., as an ARQ IP packet 445 of FIG. 4B with the user packet 1105 as payload).
At the fixed terminal 110-b (which includes an ARQ unit, for example ARQ unit 270 of FIG. 2), the ARQ IP packet 1110 is received. The ARQ IP packet 1110 is processed, and the fixed terminal 110-b recognizes the packet as an ARQ packet. The fixed terminal 110-b determines that the destination host (of user packet 1105) is no longer accessible (e.g., by accessing its own ARQ table, or otherwise receiving data indicating no reachability). this may be because the host moved 1102 to a second fixed terminal 110-a. The fixed terminal 110-b may update its own ARQ table if necessary (associating the COTM terminal 115-b with the source IP address), and format and transmit an error packet 1115 (referred to as an ARQ-DS-Error packet in FIG. 11A). This packet 1115 may be formatted as the control packet 470 of FIG. 4B (with the destination IP address the same as the source IP address of the user packet 1105, or perhaps the IP address of the COTM terminal 115-b). There is an identifier in the error packet 1115 that it is an ARQ packet (or more specifically an error packet), and this indicator may be in the “Next Protocol Field” of the error packet 1115.
The COTM terminal 115-b then receives the error packet 1115, and updates its ARQ table to end the association of the fixed terminal 110-b with the destination IP address of the IP packet 605. The COTM terminal 115-b formats and forwards a probe IP packet 1120 (referred to as an ARQ-DS-REQ packet in FIG. 11A, and equivalent to packet 1010 of FIG. 10). This packet 1120 may be formatted as the ARQ IP packet or ARQ control packet FIG. 4B or 4C, for example, with the destination IP address the same as the destination IP address of the originally received user packet 1105. However, there is an identifier in the probe IP packet 1120 that it is a probe packet (or simply that it is an ARQ packet), and this indicator may be in the “Next Protocol Field” of the probe IP packet 1120. The COTM terminal 115-b may also forward the received IP packet 1105 that has been buffered, or continue to hold it in a buffer until an ARQ session is established (alternatively, the probe packet 1120 might be configured to carry the IP packet 1105 as its payload). Other methods may be used to retransmit the originally received IP packet 1105, as well, perhaps depending on an applicable delay limit.
At the second fixed terminal 110-a (which includes an ARQ unit, for example ARQ unit 225 of FIG. 2), the probe IP packet 1120 is captured. The probe IP packet is processed, and the fixed terminal 110-a recognizes the packet as an ARQ packet (or, possibly as an ARQ control packet) with a destination IP address for one of its reachable users. The fixed terminal 110-a may then update its own ARQ table (e.g., table 900 of FIG. 9), thereby associating the source IP address with the COTM terminal 115-b. The fixed terminal 110-a formats and forwards a response packet 1125 (referred to as an ARQ-DS-Response packet in FIG. 11A). This packet 1125 may be formatted as the ARQ packet 445 or 485 or control packet 470 or 490 of FIG. 4B or 4C (with the destination IP address the same as the source IP address of the received IP packet 1105, or perhaps the IP address of the COTM terminal 115-b). There is indicator that it is a response packet or, more generally, an ARQ packet, and this may be in the “Next Protocol Field” of the response packet 1125.
The COTM terminal 115-b then receives the response packet 1125, and updates its ARQ table to associate the fixed terminal 110-a with the destination IP address of the IP packet 1105. The COTM terminal 115-b then proceeds to transmit one or more additional packets 1130, using an existing session or creating a new one with fixed terminal 110-a, as described above with reference to FIG. 10.
Other updating methods relating to host mobility are available, as well. Referring next to FIG. 11B, a packet flow diagram 1150 illustrates the flow of packets among the COTM terminal 115-b, a first fixed terminal 110-b, and a second fixed terminal 110-a of FIG. 1, 2, or 3, according to an embodiment of the invention. A host 1152, initially associated with the first fixed terminal 110-b, moves to the second fixed terminal 110-a, as had occurred in the discussion related to FIG. 11A. A user packet 1155 from the host (now associated with the second fixed terminal 110-a) is transmitted directed at the destination IP address associated with the COTM terminal 115-b.
The fixed terminal 110-a then accesses a table (e.g., accessing table 900 of FIG. 9 using ARQ unit 225 of FIG. 2) to determine whether there is a terminal (and possibly a session identifier) that is associated with the destination IP address. If the COTM terminal 115-b is the known associated terminal, and a session is available, the fixed terminal 110-a may encapsulate the user packet to form an ARQ packet 1160 (e.g., ARQ packet 445 or 485 of FIG. 4B or 4C), and transmit it to COTM terminal 115-b. If not, the discovery process described above (related to FIG. 10) may be used, and the ARQ packet 1160 transmitted to the COTM terminal 115-b may be a probe packet (e.g., a probe packet 1010 of FIG. 10). When the ARQ packet 1160 reaches the COTM terminal 115-b, the ARQ table at the COTM terminal 115-b is updated to reflect that the host IP address is now associated with fixed terminal 110-a instead of 110-b.
FIG. 12A is a flowchart illustrating a method 1200 of transmitting a terminal discovery probe packet according to various embodiments of the invention. The method 1200 may, for example, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 1205, a listing of associations (e.g., table 900 of FIG. 9) between each of a number of destination network addresses and one or more error control protocol-aware terminals is maintained. At block 1210, there is a determination that a selected destination network address is not associated with at least one of the error control protocol-aware terminals in the listing. At block 1215, a probe packet is transmitted on the routing path to the selected destination network address, the probe packet including an identifier formatted to be recognized by a terminal configured to be error control protocol-aware. At block 1220, a response packet is received from an error control protocol-aware terminal on the routing path. At block 1225, the listing of associations is updated with an association between the selected destination network address and the error control protocol-aware terminal.
FIG. 12B is a flowchart illustrating a method 1230 of receiving a terminal discovery probe packet according to various embodiments of the invention. This method 1230 may, for example, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 1235, a probe packet is received at a first error control protocol-aware terminal, the probe packet transmitted from a second error control protocol-aware terminal destined for an end terminal associated with a destination network address. At block 1240, the probe packet is captured to identify the second error control protocol-aware terminal, the capture based on a probe packet identifier included in the probe packet. At block 1245, a response packet is transmitted to the second error control protocol-aware terminal identifying the probe packet, the response packet formatted with information for the second error control protocol-aware terminal to generate an association between the destination network address and the first error control protocol-aware terminal for error control communications.
FIG. 12C is a flowchart illustrating a method 1250 of updating error control terminal associations according to various embodiments of the invention. The method 1250 may, again, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 1255, a listing of associations is again maintained between each of a number of destination network addresses and error control protocol-aware terminals, the listing identifying one or more error control protocol-aware terminals on respective routing paths for each destination network address. At block 1260, an entry in the listing is identified associating a selected destination network address with one of the error control protocol-aware terminals. At block 1265, a data packet is transmitted including error control data formatted to be recognized and captured by the associated error control protocol-aware terminal, the transmission based on the identification of the entry. At block 1270, a reachability packet is received from the error control protocol-aware terminal indicating that the selected destination network address has become unreachable from the error control protocol-aware terminal. At block 1275, the listing of associations is updated to remove the association between the selected destination network address and the error control protocol-aware terminal.
FIG. 12D is a flowchart illustrating an alternative method 1280 of updating error control terminal associations according to various embodiments of the invention. As in the above examples, this method 1280 may be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 1285, a listing of associations is maintained between destination network addresses and error control protocol-aware terminals, the listing identifying a first error control protocol-aware terminal associated with a destination network address for an end terminal, the first error control protocol-aware terminal on the routing path to the end terminal. At block 1290, a reachability packet is received from a second error control protocol-aware terminal indicating that the destination network address is reachable from the second error control protocol-aware terminal. In one embodiment, a second reachability packet may, but need not, be received from a first error control protocol-aware terminal, as well. At block 1295, the listing of associations is updated to remove the association between the destination network address and the first error control protocol-aware terminal and add an association between the destination network address and the second error control protocol-aware terminal.
FIG. 13A is a flowchart illustrating a method 1300 of establishing error control communications between terminals in a mobile host environment according to various embodiments of the invention. This method 1300 may, as in the above examples, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 1305, a listing of associations is maintained between destination network addresses and error control protocol-aware terminals, the listing identifying error control protocol-aware terminals on respective routing paths for each destination network address. At block 1310, an entry in the listing is identified associating a first destination network address with a first error control protocol-aware terminal. At block 1315, a first data packet is transmitted including error control data formatted to be recognized and captured by the first error control protocol-aware terminal, the transmission based on the identification of the entry.
At block 1320, a reachability packet is received from the first error control protocol-aware terminal indicating that the first destination network address has become unreachable is received from the first error control protocol-aware terminal. At block 1325, the listing of associations is updated to remove the association between the first destination network address and the first error control protocol-aware terminal. At block 1330, a probe packet is transmitted on the routing path to the first destination network address, the probe packet including a first identifier formatted to be recognized by a terminal configured to be error control protocol-aware.
At block 1335, a response packet is received from a second error control protocol-aware terminal on the routing path in response to the probe packet. At block 1340, the listing is updated with an association between the first destination network address and the second error control protocol-aware terminal. At block 1345, a session establishment packet is transmitted to the second error control protocol-aware terminal, the session establishment packet requesting that an error control session be established based on the content classification of a data packet to be transmitted to the first destination network address via the second error control protocol-aware terminal.
FIG. 13B is a flowchart illustrating a method 1350 of updating terminal associations for error control communications between terminals in a mobile host environment according to various embodiments of the invention. The method 1350 may, for example, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 1355, a listing of associations is maintained between network addresses and error control protocol-aware terminals, the listing identifying error control protocol-aware terminals on respective routing paths for each network address. At block 1360, a probe packet is received from a first error control protocol-aware terminal not included in the listing, the probe packet destined for an end terminal associated with a first network address. At block 1365, the probe packet is captured to identify the first error control protocol-aware terminal and a second network address that is the source network address, the capture based on a probe packet identifier included in the probe packet.
At block 1370, a response packet is transmitted to the first error control protocol-aware terminal, confirming receipt of the probe packet. At block 1375, the listing of associations is updated with an association between the second network address and the first error control protocol-aware terminal. At block 1380, the user associated with transmission from the second network address moves to be reachable from a second error control protocol-aware terminal. At block 1385, a reachability packet is received from the second error control protocol-aware terminal indicating that the second network address is reachable from the second error control protocol-aware terminal. At block 1390, the listing of associations is updated to remove the association between the second network address and the first error control protocol-aware terminal and to add an association between the second network address and the second error control protocol-aware terminal.
In yet another set of embodiments, features of these error control mechanisms include a configurable delay limit, which may be tailored to traffic type or class. TPv4 and TPv6 packets each include a one byte Type of Service (ToS) or Differentiated Services (DiffServ) field. As will be discussed in greater detail below, this field may be used to indicate the underlying service being transported (referred to herein as the traffic content classification). The field could be used to define the delay sensitivity of the frame being transported. Frames with different delay sensitivities (e.g., UDP v. TCP packets, voice v. e-mail) may then be configured with different delay limits at the transmitter, along with related time limits for buffering at the receiver. Using varied delay limits, multiple different ARQ sessions with differing delay limits may take place concurrently between terminals (or between a terminal and a satellite).
Referring first to FIG. 14, an example of a delay limit table 1400 is shown that may be stored in memory of a terminal (e.g., the fixed terminal 110, COTM terminal 115, or satellite 105 of FIG. 1), or stored elsewhere and remotely accessed. A first column includes a list of various traffic content classifications 1405 (streaming audio, streaming video, interactive audio, interactive video, and other data). In the illustrated embodiment, there are two different levels of quality of service 1410, and these may result in different delay limits. Therefore, in the illustrated embodiment, the delay limit 1415 for retransmission from a given terminal may be based on a content classification 1405 and quality of service 1410. In other embodiments, there may be more, fewer, or different classifications for data traffic and quality of service metrics. Delay limits may be also based on load at a terminal, latency at a terminal, estimated transit time to an intermediate terminal or end user, or estimated processing time at particular devices in the routing path.
Referring next to FIG. 15, a packet flow diagram 1500 illustrating options for packet retransmission will be described. The illustrated diagram assumes a single delay limit (thus, it may represent a single session), but the principles may be applied to a varied delay limit environment. Such protocols may be used on links, for example, between a satellite 105 and a terminal (110 or 115) of FIG. 1, or from a terminal (110 or 115) to a terminal (110 or 115) through a satellite 105. In such links, there will be a transmitter 1505 and receiver 1510 of packets, although a particular device (terminal or satellite) may be both a transmitter and receiver. For example, in an embodiment described with reference to FIG. 2, the transmitter 1505 may be the COTM terminal 115-b, and the receiver 1510 may be the fixed terminal 110-b. The transmissions may, for example, be formatted as ARQ packets 445, 485, 555 or control packets 470, 495, 575 of FIG. 4B, 4C, or 5B. The transmissions in either direction are represented by the arrowed lines 1515 between transmitter 1505 and receiver 1510.
In one embodiment, one or more packets are identified as packets to be transmitted with appended error control data, as described above (e.g., with reference to the routing unit 220 of FIG. 2). A packet to be transmitted is buffered and assigned a send sequence number txseq 1520 (and a delay limit may be set based on the content classification of the packet). At certain intervals (for example, every N packets (e.g., N=4), after variable or set time intervals, or a combination thereof), a STATREQ packet 1525 is sent by the transmitter 1505 to the receiver 1510. In the illustrated embodiments, the STATREQ packet 1525 is sent without payload, but in other embodiments it may include a payload. The intervals between each STATREQ packet 1525 may be based on the delay limit, as well. This STATREQ packet 1525 may contain txTseq (the time sequence number) and txSseq (the highest sequence number sent+1). In one embodiment, the STATREQ packet 1525 is also sent whenever a certain time has elapsed (e.g., 0.1 seconds) since the last STATREQ packet 1525 was sent, and some data remains unacknowledged. The STATREQ packet 1525 may also be sent when a certain amount of time (e.g., 5 seconds) has elapsed since the last STATREQ packet 1525 was sent, and no data remains unacknowledged. Note that within a round trip time, several STATREQ packets 1525 may be sent.
In one embodiment, the time sequence txTseq is maintained by the transmitter 1505, which is incremented after each STATREQ packet 1525 is transmitted. The current time sequence value, txTseq, may be saved locally (or, for example, at the receiver 1510) for each packet, when it is transmitted or retransmitted.
When the receiver 1510 receives an out-of-sequence packet, whose sequence number is larger (in this example, by two or more sequence numbers) than the largest sequence number received, the receiver 1510 may be triggered to buffer the out-of sequence packet and to send a USTAT packet 1530 to the transmitter 1505, the USTAT packet 1530 identifying the rxseq (the sequence number below which all packets have been received, or discarded (because the buffering time limit expired)). The USTAT packet 1530 may also provide spanlist information (sequence numbers or other information for the missing packet(s) and/or sequence numbers or other information for the received packet(s)). Thus, the rxseq and spanlist may each provide acknowledgement information (making up both ACKs and NACKs).
When the receiver 1510 receives a STATREQ packet 1520, it may be configured to send a STAT packet 1535 which contains rxTseq (the received time sequence number), rxseq (the sequence number below which all packets have been received), and spanlist information (sequence numbers or other information for the missing packet(s) and/or sequence numbers or other information for the received packet(s)).
When the transmitter 1505 receives a USTAT packet 1530, it may free up buffer space (discarding the buffered data) of the acknowledged packets (and perhaps any packets for which a delay timer has expired). When the transmitter 1505 receives a USTAT packet 1535, it may retransmit missing packets identified in the USTAT packet 1535 when the delay limit has not expired. When the transmitter 1505 receives a STAT packet 1535, it may free up buffer space (discarding the buffered data) of the acknowledged packets (and perhaps any packets for which a delay timer has expired). The transmitter 1505 may also retransmit the missing packets identified in the STAT packet 1535, if the delay limit has not expired. In some embodiments, the transmitter 1505 response to the STAT packet 1535 is performed only if the txTseq (the time sequence number) saved for the packet is less than or equal to the rxTseq (the received time sequence number) received in the STAT packet.
In various retransmission protocol embodiments, the receiver 1510 buffers out-of-sequence packets and delivers them in-sequence to the user network when missing packets arrive. The receiver 1510 then discards the buffered data packets. The receiver 1510 may also buffer the out-of-sequence packets until a time limit expires (or is about to expire), and then forward such packets out-of-sequence and discard them upon forwarding. This time limit for buffering may be received from the transmitter 1505, or may be calculated based on the delay limit for the transmitter (e.g., by adding an estimated or average transit and processing time to the delay limit, in addition to a margin). There are, thus, a number of different ways that a buffering time limit may be calculated or set for the receiver. Those skilled in the art will recognize that the delay limits and time limits may take on a variety of forms, and may be calculated based on one another. As used herein, the discarding of buffered data packets may be accomplished by freeing memory space.
The transmitter 1505 may maintain a local sequence number (referred to hereinafter as “NA”), such that all packets below NA have been acknowledged by the receiver (or timed out because of the expiration of the delay timer). This variable may be updated by the rxSeq variable in a STAT 1535 or USTAT 1530 packet received at the transmitter. A spanlist may contain a compact representation of a list of sequence numbers of missing packets and a list of sequence numbers of received out-of-sequence packets, although in other embodiments some or all of this information may be represented in alternative forms.
The retransmission protocol may operate in real-time mode (when certain delay limits are implemented), or may operate without delay limits in other embodiments. It is worth making a more detailed examination of embodiments in which delay limits are implemented. In one such embodiment, the transmitter 1505 may be configured with certain delay limits (e.g., hereinafter identified as a delayLimit time) for a particular ARQ session that carries real-time traffic. In such an embodiment, a transmitter 1505 may be configured to append a data packet header containing a field (e.g., a maxDelay field), which allows the receiver 1510 to calculate how long the packet should be buffered at the receiver 1510.
In one embodiment, when a packet arrives at the transmitter 1505 from a network, the transmitter 1505 may save an arrival time for the packet, and may calculate a delay limit for retransmission (hereinafter, “delayLimit”). When the transmitter 1505 transmits or retransmits a packet, it may be configured to check whether, for example, current time−packet arrival time>delayLimit. If no, then it may set the maxDelay field to delayLimit−(current time−packet arrival time), and send the packet. If yes, then the packet will not be transmitted.
When the transmitter 1505 sends a STATREQ packet 1525, it may check if there are any unacknowledged packets which have been waiting for a time equal or greater than delayLimit. If so, it may discard them (e.g., by freeing buffer space they occupy) and update NA through (or past) those packets. The NA value may be sent by the transmitter in STATREQ 1525 packets.
Turning to the receiver 1510, when it receives an out-of-sequence packet, it may save the maxDelay field of the packet, and the packet transmit and reception times for the packet. When a receiver 1510 receives a STATREQ packet 1525 with NA greater than rxseq, the receiver may bump up the rxseq value to NA and deliver any out-of-sequence packets below NA to the network, freeing up the buffer space for the delivered packets. The receiver 1510 may do so based on the maxDelay field of one or more of the packets. Periodically (e.g., at a variable or fixed interval), and when it receives a STATREQ packet 1525, a receiver 1510 may check if any out-of-sequence packets have (current time−packet transmission time)>maxDelay value of that packet. If yes, then that packet may be delivered to the network (thereby freeing up the buffer space for the delivered packets), and rxseq may be bumped up to the next missing packet.
Additionally, each data packet (or a subset thereof) may contain a timestamp value, containing the time when the packet was last transmitted. If the receiver and transmitter maintain synchronized time, the packet transit time between the transmitter and receiver may be measured=(current local time−timestamp value), and then it may be subtracted from the received maxDelay value. In other embodiments, the transmit time may be estimated or otherwise accounted for. For example, if the receiver and transmitter cannot maintain synchronized time, then the receiver may use a configured lower bound on the transit delay value to subtract from the packet maxDelay value. It is worth noting that different delay limits and time limits may be used for different applications and/or types of service. Increasing the delay limit may make the protocol more reliable but require more memory and may increase delay. It is also worth mentioning that description of the delay limit for retransmission and the time limit for buffering are for purposes of example only, and many alternative implementations may be based on the enabling description herein.
FIG. 16A is a flowchart illustrating a method 1600 of setting delay limits for error control retransmissions according to various embodiments of the invention. The method 1600 may, for example, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 1605, a data packet is identified as a packet to be transmitted with appended error control data. At block 1610, a delay limit is set for error control retransmissions. At block 1615, the error control data is generated, the error control data including a time limitation for buffering of the data packet at the receiver based on the set delay limit. At block 1620, the data packet and appended error control data are transmitted.
FIG. 16B is a flowchart illustrating an alternative method 1625 of setting delay limits for error control retransmissions based on traffic content according to various embodiments of the invention. The method 1625 may, for example, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 1630, a number of different delay limits are established for error control retransmission, each based on traffic content classification. At block 1635, a data packet is received. At block 1640, the data packet is identified as a data packet to be transmitted with appended error control data.
At block 1645, the traffic content classification is identified for the first data packet. At block 1650, a delay limit is set for error control retransmission based on the identified classification. At block 1655, the data packet is buffered, while at block 1660, the buffered data packet is associated with the set delay limit.
At block 1665, time is monitored for expiration of set delay limit, and incoming packets are monitored for receipt of acknowledgement packet (e.g., a USTAT packet 1530 or STAT packet 1535 of FIG. 15). At block 1670, a determination is made whether the delay limit for retransmission has expired. If not, at block 1675, a determination is made whether an acknowledgment has been received for the data packet (e.g., from the rxseq or spanlist information of a STAT packet 1535 or a USTAT packet 1530). If the delay limit for retransmission has expired, or acknowledged receipt has been received for the data packet, the buffered data packet is discarded at block 1680.
Assuming the delay limit for retransmission has not expired, and yet no acknowledged receipt has been received, a determination may be made at block 1685 regarding a received negative acknowledgement (e.g., a missing packet from the rxseq or spanlist information of a STAT packet or a USTAT packet). The missing data packet may be retransmitted if a sufficient interval has elapsed at block 1690. The processing then returns to block 1665, where time is monitored for expiration of the set delay limit, and incoming packets are monitored for receipt of acknowledgement packets.
FIG. 17A is a flowchart illustrating a method 1700 of setting buffering time limits for waiting for missing packets according to various embodiments of the invention. The method 1700 may, as in the above examples, be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 1705, an out-of-sequence data packet appended to error control data is received, the error control data including data for calculating a time limit for buffering the received data packet. At block 1710, the received data packet is buffered. At block 1715, the time limit is processed to determine whether the time limit for buffering the received data packet has expired. At block 1720, the buffered data packet is forwarded after the processing of the time limit.
FIG. 17B is a flowchart illustrating a method 1725 of setting and monitoring time limits for missing packets according to various embodiments of the invention. As above, the method 1700 may be performed in whole or in part by the COTM terminal 115, the fixed terminal 110, or the satellite 105 of FIG. 1, 2, or 3.
At block 1730, a data packet appended to error control data is received, the error control data including a sequence number and a time limit for buffering the received data packet. At block 1735, the received data packet is identified as an out-of-sequence data packet. At block 1740, the received data packet is buffered (note, in one embodiment in-sequence packets are simply forwarded and discarded, without waiting for missing packets). At block 1745, time is monitored for expiration of the time limit, and received packets are monitored for missing packets.
At block 1750, a determination is made whether the time limit for buffering has expired. If not, at block 1755, a determination is made whether missing packets have been received for the data packet. If either the time limit for buffering has expired (or is about to expire), or missing packets have been received to make the data packet an in-sequence data packet, the buffered data packet is forwarded at block 1760, then discarded at block 1765.
Assuming the time limit for buffering has not expired, and yet packets remain missing, a determination may be made at block 1770 regarding whether there is sufficient time to request retransmission at block 1775 (e.g., in a STAT packet 1535 or a USTAT 1530 packet). The request for retransmission may be sent if a sufficient time for buffering remains. The processing then returns to block 1745, where time is monitored for expiration of the time limit, and incoming packets are monitored for missing packets.
It should be noted that the methods, systems, devices, and software discussed above are intended merely to be examples. It must be stressed that various embodiments may omit, substitute, or add various procedures or components as appropriate. For instance, it should be appreciated that, in alternative embodiments, the methods may be performed in an order different from that described, and that various steps may be added, omitted, or combined. Also, features described with respect to certain embodiments may be combined in various other embodiments. Different aspects and elements of the embodiments may be combined in a similar manner. Also, it should be emphasized that technology evolves and, thus, many of the elements are examples and should not be interpreted to limit the scope of the invention.
Specific details are given in the description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. It is also worth noting that well-known circuits, processes, algorithms, structures, and techniques have been shown without unnecessary detail in order to avoid obscuring the embodiments.
The embodiments may be described as a process which is depicted as a flow diagram or block diagram. Although each may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be rearranged. A process may have additional steps not included in the figure.
Moreover, as disclosed herein, the term “memory” or “memory unit” may represent one or more devices for storing data, including read-only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices or other computer-readable mediums for storing information. The term “computer-readable medium” includes, but is not limited to, portable or fixed storage devices, optical storage devices, wireless channels, a sim card, other smart cards, and various other mediums capable of storing, containing, or carrying instructions or data.
Furthermore, embodiments may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware, or microcode, the program code or code segments to perform the necessary tasks may be stored in a computer-readable medium such as a storage medium. Processors may perform the necessary tasks.
Having described several embodiments, it will be recognized by those of skill in the art that various modifications, alternative constructions, and equivalents may be used without departing from the spirit of the invention. For example, the above elements may merely be a component of a larger system, wherein other rules may take precedence over or otherwise modify the application of the invention. Also, a number of steps may be undertaken before, during, or after the above elements are considered. Accordingly, the above description should not be taken as limiting the scope of the invention.

Claims (16)

1. A system of discovering a terminal on a routing path to a first destination IP address, the system comprising:
a first error control protocol-aware terminal on the routing path to a mobile end terminal, the mobile end terminal having the first destination IP address, the first error control protocol-aware terminal comprising a first non-transitory computer-readable storage medium coupled to a first processor, wherein the first non-transitory computer-readable storage medium stores a first code, the first code when executed by the first processor is:
maintaining a listing of associations between each of a plurality of destination IP addresses and one or more error control protocol-aware terminals;
processing a data packet to be forwarded to the first destination IP address;
determining that the first destination IP address is not associated in the listing with the one or more error control protocol-aware terminals; and
generating and transmitting a first probe packet on the routing path to the first destination IP address for the mobile end terminal, the first probe packet including a first identifier formatted to be recognized by a terminal configured to be error control protocol-aware; and
a second error control protocol-aware terminal on the routing path between the first error control protocol-aware terminal and the mobile end terminal, the second error control protocol-aware terminal comprising a second non-transitory computer-readable storage medium coupled to a second processor, wherein the second non-transitory computer-readable storage medium stores a second code, the second code when executed by the second processor is:
receiving the first probe packet;
identifying and capturing the first probe packet based at least in part on the first identifier; and
generating and transmitting a response packet identifying the first probe packet and the second error control protocol-aware terminal, the response packet formatted with information for the first error control protocol-aware terminal to update the listing of associations with an association between the first destination IP address for the mobile end terminal and the second error control protocol-aware terminal,
wherein the first code when executed by the first processor is:
receiving the response packet transmitted from the second error control protocol-aware terminal;
updating the listing of associations to add an association between the first destination IP address for the mobile end terminal and the second error control protocol-aware terminal; and
generating and transmitting a data packet including error control data formatted to be captured by the second error control protocol-aware terminal;
wherein the second code when executed by the second processor is:
receiving the data packet from the first error control protocol-aware terminal;
identifying and capturing the data packet;
detecting that the first destination IP address for the mobile end terminal has become unreachable from the second error control protocol-aware terminal; and
generating and transmitting a reachability packet to the first error control protocol-aware terminal indicating that the first destination IP address for the mobile end terminal has become unreachable from the second error control protocol-aware terminal; and
wherein the first code when executed by the first processor is:
receiving the reachability packet transmitted from the second error control protocol-aware terminal;
updating the listing of associations to end the association between the first destination IP address for the mobile end terminal and the second error control protocol-aware terminal; and
generating and transmitting a second probe packet on the routing path to the first destination IP address for the mobile end terminal, the second probe packet including the first identifier formatted to be recognized by a terminal configured to be error control protocol-aware.
2. The system of claim 1, wherein the first code when executed by the first processor is:
buffering the data packet; and
transmitting the buffered data packet on the routing path through the second error control protocol-aware terminal, the transmission of the data packet triggered by the updated association between the first destination IP address for the mobile end terminal and the second error control protocol-aware terminal.
3. The system of claim 1, wherein the first code when executed by the first processor is:
buffering the data packet;
appending error control data to the data packet, the error control data comprising a sequence number and a second identifier formatted to be recognized by the second error control protocol-aware terminal; and
transmitting the data packet and appended error control data on the routing path through the second error control protocol-aware terminal directed at the mobile end terminal.
4. The system of claim 3, wherein the second code when executed by the second processor is:
capturing the data packet transmitted from the first error control protocol-aware terminal and appending error control data based at least in part on the second identifier, in response to determining that the mobile end terminal is reachable; and
transmitting to the first error control protocol-aware terminal an acknowledgement packet identifying the sequence number, and transmitting the data packet to the mobile end terminal.
5. The system of claim 1, wherein the first code when executed by the first processor is, prior to the ending of the association between the first destination IP address for the mobile end terminal and the second error control protocol-aware terminal,
generating and transmitting a session establishment packet to the second error control protocol-aware terminal, the session establishment packet requesting that an error control session be established based at least in part on a content classification of the data packet.
6. The system of claim 5, wherein the second code when executed by the second processor is, prior to the detecting that the first destination IP address for the mobile end terminal has become unreachable from the second error control protocol-aware terminal,
receiving the session establishment packet; and
generating an error control session entry for the content classification between the first and the second error control protocol-aware terminals.
7. The system of claim 1, wherein the probe packet comprises the data packet.
8. The system of claim 1, wherein the second code when executed by the second processor is:
updating a listing of associations maintained at the second error control protocol-aware terminal with an association between a source IP address and the first error control protocol-aware terminal, the updating based at least in part on the received first probe packet.
9. The system of claim 1, wherein,
the first probe packet is transmitted via satellite from the first error control protocol-aware terminal to the second error control protocol-aware terminal; and
the response packet is transmitted via satellite from the second error control protocol-aware terminal to the first error control protocol-aware terminal.
10. A method of discovering a terminal on a routing path to a first destination IP address:
the method comprising the following steps executed by a first error control protocol-aware terminal:
maintaining a listing of associations between each of a plurality of destination IP addresses and one or more error control protocol-aware terminals;
processing a data packet to be forwarded to the first destination IP address;
determining that the first destination IP address is not associated in the listing with the one or more error control protocol-aware terminals; and
generating and transmitting a first probe packet on the routing path to the first destination IP address for the mobile end terminal, the first probe packet including a first identifier formatted to be recognized by a terminal configured to be error control protocol-aware; and
the method comprising the following steps executed by a second error control protocol-aware terminal:
receiving the first probe packet;
identifying and capturing the first probe packet based at least in part on the first identifier; and
generating and transmitting a response packet identifying the first probe packet and the second error control protocol-aware terminal, the response packet formatted with information for the first error control protocol-aware terminal to update the listing of associations with an association between the first destination IP address for the mobile end terminal and the second error control protocol-aware terminal,
wherein the method further comprises the following steps executed by the first error control protocol-aware terminal:
receiving the response packet transmitted from the second error control protocol-aware terminal;
updating the listing of associations to add an association between the first destination IP address for the mobile end terminal and the second error control protocol-aware terminal; and
generating and transmitting a data packet including error control data formatted to be captured by the second error control protocol-aware terminal;
wherein the method further comprises the following steps executed by the second error control protocol-aware terminal:
receiving the data packet from the first error control protocol-aware terminal:
identifying and capturing the data packet;
detecting that the first destination IP address for the mobile end terminal has become unreachable from the second error control protocol-aware terminal; and
generating and transmitting a reachability packet to the first error control protocol-aware terminal indicating that the first destination IP address for the mobile end terminal has become unreachable from the second error control protocol-aware terminal; and
wherein the method further comprises the following steps executed by the first error control protocol-aware terminal:
receiving the reachability packet transmitted from the second error control protocol-aware terminal;
updating the listing of associations to end the association between the first destination IP address for the mobile end terminal and the second error control protocol-aware terminal; and
generating and transmitting a second probe packet on the routing path to the first destination IP address for the mobile end terminal, the second probe packet including the first identifier formatted to be recognized by a terminal configured to be error control protocol-aware.
11. The method of claim 10, further comprising the following steps executed by the first error control protocol-aware terminal:
buffering a data packet to be forwarded to the first destination IP address for the mobile end terminal; and
transmitting the buffered data packet on the routing path through the second first error control protocol-aware terminal directed to the mobile end terminal, the transmission of the data packet triggered by the updated association between the first destination IP address for the mobile end terminal and the second error control protocol-aware terminal.
12. The method of claim 10, further comprising the following steps executed by the first error control protocol-aware terminal:
receiving the data packet to be forwarded to the first destination IP address for the mobile end terminal;
appending error control data to the data packet, the error control data comprising a sequence number and a second identifier formatted to be recognized by the second error control protocol-aware terminal; and
transmitting the data packet and appended error control data on the routing path through the second error control protocol-aware terminal directed at the mobile end terminal having the first destination IP address.
13. The method of claim 12, further comprising the following steps executed by the first error control protocol-aware terminal:
receiving an acknowledgement packet identifying the sequence number from the second error control protocol-aware terminal; and
discarding the received data packet based on the acknowledgement.
14. The method of claim 10, prior to the ending of the association between the first destination IP address for the mobile end terminal and the second error control protocol-aware terminal, further comprising the following steps executed by the first error control protocol-aware terminal:
transmitting a session establishment packet to the second error control protocol-aware terminal, the session establishment packet requesting that an error control session be established based at least in part on a content classification of the data packet; and
receiving a session acknowledgement packet from the second error control protocol-aware terminal indicating that an error control session entry was generated between the first and the second error control protocol-aware terminals for the content classification.
15. The method of claim 10, wherein the probe packet comprises the data packet.
16. The method of claim 10, further comprising the following steps executed by the first error control protocol-aware terminal:
in response to transmitting the second probe, receiving a response packet from a third error control protocol-aware terminal on the routing path to the mobile end terminal having the first destination IP address; and
updating the listing of associations with an association between the first destination IP address for the mobile end terminal and the third error control protocol-aware terminal.
US12/019,297 2007-01-24 2008-01-24 Error control terminal discovery and updating Active 2029-11-07 US8260935B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US12/019,297 US8260935B2 (en) 2007-01-24 2008-01-24 Error control terminal discovery and updating

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US88634907P 2007-01-24 2007-01-24
US12/019,297 US8260935B2 (en) 2007-01-24 2008-01-24 Error control terminal discovery and updating

Publications (2)

Publication Number Publication Date
US20080177884A1 US20080177884A1 (en) 2008-07-24
US8260935B2 true US8260935B2 (en) 2012-09-04

Family

ID=39580265

Family Applications (3)

Application Number Title Priority Date Filing Date
US12/019,287 Active 2028-08-09 US7920477B2 (en) 2007-01-24 2008-01-24 Network layer error control systems and methods
US12/019,297 Active 2029-11-07 US8260935B2 (en) 2007-01-24 2008-01-24 Error control terminal discovery and updating
US12/019,292 Active 2028-12-16 US7881205B2 (en) 2007-01-24 2008-01-24 Configurable delay limit for error control communications

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US12/019,287 Active 2028-08-09 US7920477B2 (en) 2007-01-24 2008-01-24 Network layer error control systems and methods

Family Applications After (1)

Application Number Title Priority Date Filing Date
US12/019,292 Active 2028-12-16 US7881205B2 (en) 2007-01-24 2008-01-24 Configurable delay limit for error control communications

Country Status (6)

Country Link
US (3) US7920477B2 (en)
EP (1) EP2119085B1 (en)
CN (1) CN101641898A (en)
AT (1) ATE485646T1 (en)
DE (1) DE602008003100D1 (en)
WO (1) WO2008092023A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220014500A1 (en) * 2018-02-28 2022-01-13 Palo Alto Networks, Inc. Identifying security risks and enforcing policies on encrypted/encoded network communications

Families Citing this family (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2119085B1 (en) 2007-01-24 2010-10-20 ViaSat, Inc. Enhanced error control communication systems and methods
JP2009135772A (en) * 2007-11-30 2009-06-18 Oki Semiconductor Co Ltd Router device
US20100023842A1 (en) * 2008-07-25 2010-01-28 Nortel Networks Limited Multisegment loss protection
US8457048B2 (en) * 2009-08-31 2013-06-04 Research In Motion Limited Methods and apparatus to avoid mobile station transmission of duplicate event-based and polled acknowledgments
WO2011096009A1 (en) * 2010-02-02 2011-08-11 株式会社 東芝 Wireless device and wireless system
US8806287B1 (en) * 2010-09-24 2014-08-12 Google Inc. Retransmission systems and methods in reliable streaming protocols using connection characteristics
CN101944974A (en) * 2010-09-28 2011-01-12 北京邮电大学 Efficient content distributing technology of satellite network
CN103327647B (en) * 2010-10-29 2016-03-30 华为技术有限公司 The delayed release method and apparatus of Temporary Block Flow
CN102231687A (en) * 2011-06-29 2011-11-02 华为技术有限公司 Method and device for detecting link failure
US20130039192A1 (en) * 2011-08-08 2013-02-14 Renesas Mobile Corporation Methods, Apparatus and Wireless Device for Transmitting and Receiving Data Blocks
KR101808644B1 (en) 2011-08-29 2017-12-21 한국전자통신연구원 Method for detecting return link packet error in satellite communication systems
CN102339071B (en) * 2011-08-31 2013-03-06 桂林电子科技大学 System and method for tracking communication in moving monopulse angle
EP2615749B1 (en) * 2011-12-20 2017-12-06 Thales Alenia Space Schweiz AG Method for optical data transmission from low earth orbit to earth and corresponding communication system
US10009445B2 (en) * 2012-06-14 2018-06-26 Qualcomm Incorporated Avoiding unwanted TCP retransmissions using optimistic window adjustments
JP6089518B2 (en) * 2012-09-11 2017-03-08 富士通株式会社 Transfer device, transfer method, and transfer program
US9363226B2 (en) * 2013-09-05 2016-06-07 International Business Machines Corporation Method for double IP address recovery
US9787852B2 (en) * 2014-06-04 2017-10-10 Alcatel-Lucent Usa Inc. Sequence number reuse for CDR transport using GTP'
US20160013976A1 (en) * 2014-07-14 2016-01-14 Futurewei Technologies, Inc. Wireless Through Link Traffic Reduction
FR3029371B1 (en) * 2014-11-28 2016-12-23 Thales Sa METHOD AND SYSTEM FOR COMMUNICATING IN A SATELLITE / TERRESTRIAL HYBRID NETWORK
CN104767559B (en) * 2015-04-07 2017-10-24 苏州大学 A kind of method for routing under the distributed interim networking scene of group of stars network
CN104734770B (en) * 2015-04-07 2017-11-21 苏州大学 A kind of distributed group of stars network route method based on context
WO2016180946A1 (en) * 2015-05-13 2016-11-17 Lantiq Beteiligungs-GmbH & Co.KG Packet aggregation communication device and method
US11575910B2 (en) * 2020-04-09 2023-02-07 Qualcomm Incorporated Video aware transmission and multiple input multiple output layer processing
US11245741B2 (en) 2020-04-09 2022-02-08 Qualcomm Incorporated Video aware multiplexing for wireless communication
US11831933B2 (en) 2020-04-09 2023-11-28 Qualcomm Incorporated Video aware transmission and processing
CN114189564A (en) * 2020-08-28 2022-03-15 华为技术有限公司 Message transmission method, device and system

Citations (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5109384A (en) 1988-11-02 1992-04-28 Tseung Lawrence C N Guaranteed reliable broadcast network
US5617561A (en) 1994-12-22 1997-04-01 International Business Machines Corporation Message sequence number control in a virtual time system
US5629948A (en) * 1993-07-22 1997-05-13 Ntt Mobile Communications Network Inc. Data transmission scheme with automatic repeat request
US5930233A (en) 1995-05-09 1999-07-27 Nokia Telecommunications Oy Data transmission system with sliding-window data flow control
US6031818A (en) * 1997-03-19 2000-02-29 Lucent Technologies Inc. Error correction system for packet switching networks
WO2000035163A1 (en) 1998-12-08 2000-06-15 Nokia Mobile Phones Ltd. A method for optimizing of data transmission
WO2000060799A1 (en) 1999-04-06 2000-10-12 Telefonaktiebolaget Lm Ericsson (Publ) Packet discard notification for semi reliable retransmission protocol
US6289012B1 (en) 1998-08-03 2001-09-11 Instanton Corporation High concurrency data download apparatus and method
US6349208B1 (en) 1999-04-28 2002-02-19 Nokia Corporation Apparatus and associated method for selectively permitting initiation or cell reselection in a radio communication system
US6374117B1 (en) 1999-12-22 2002-04-16 Telefonaktiebolaget Lm Ericsson (Publ) Queue based power control scheduling
US6493342B1 (en) * 1998-09-11 2002-12-10 Teledesic Llc Method of data transmission in a data communication network
US20030012178A1 (en) 2001-04-06 2003-01-16 Mussman Harry Edward Alternate routing of voice communication in a packet-based network
US6577642B1 (en) * 1999-01-15 2003-06-10 3Com Corporation Method and system for virtual network administration with a data-over cable system
US20030174663A1 (en) 2002-03-15 2003-09-18 Douglas Dillon Method and system for providing differentiated quality of service diversity ALOHA
US6646987B1 (en) 1998-10-05 2003-11-11 Nortel Networks Limited Method and system for transmission control protocol (TCP) packet loss recovery over a wireless link
US20030212827A1 (en) * 2002-05-08 2003-11-13 Abheek Saha Method and system for providing peer-to-peer exchange of terminal information over a meshed network
US6697331B1 (en) 1999-11-17 2004-02-24 Telefonaktiebolaget Lm Ericsson (Publ) Link layer acknowledgement and retransmission for cellular telecommunications
US20050022097A1 (en) 2003-07-22 2005-01-27 Jung-Fu Cheng Adaptive hybrid ARQ algorithms
US20050141419A1 (en) 2003-06-17 2005-06-30 Cisco Technology, Inc. A Corporation Of California Methods and devices for the coordination of flow control between a TCP/IP network and other networks
WO2005060200A1 (en) 2003-12-17 2005-06-30 Telefonaktiebolaget Lm Ericsson (Publ) Technique for handling outdated information units
US6925096B2 (en) 2000-09-22 2005-08-02 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for managing traffic flows
US6937864B2 (en) 2001-05-04 2005-08-30 Samsung Electronics Co., Ltd. Transmission apparatus and method for multimedia service in mobile communication system
US7000021B1 (en) * 2001-10-12 2006-02-14 Cisco Technology, Inc. ARQ (automatic repeat request) for broadband fixed wireless network
US7020083B2 (en) 2000-08-31 2006-03-28 The Regents Of The University Of California Method for improving TCP performance over wireless links
US20060098659A1 (en) * 2004-11-05 2006-05-11 Silicon Graphics Inc. Method of data packet transmission in an IP link striping protocol
US7145889B1 (en) 2002-03-28 2006-12-05 Nortel Networks Limited Efficient frame retransmission in a wireless communication environment
US20070091908A1 (en) 2001-11-01 2007-04-26 Kabushiki Kaisha Toshiba Communication device and communication control method using efficient echonet address determination scheme
US7330439B1 (en) 1999-05-21 2008-02-12 Nokia Corporation Packet data transmission in third generation mobile system
US7394762B2 (en) 2004-04-21 2008-07-01 National University Of Ireland Maynooth Congestion control in data networks
US20080212510A1 (en) 2005-07-07 2008-09-04 Peter Larsson Method and Arrangement for Coding and Scheduling in Packet Data Communication Systems
US7428595B2 (en) 2002-09-30 2008-09-23 Sharp Laboratories Of America, Inc. System and method for streaming TCP messages in an enterprise network
US20080317017A1 (en) 2004-08-31 2008-12-25 Henning Wiemann Data Unit Sender and Data Unit Relay Device
US7787372B2 (en) 2005-12-12 2010-08-31 Viasat, Inc. Transmission control protocol with performance enhancing proxy for degraded communication channels
US7881205B2 (en) 2007-01-24 2011-02-01 Viasat, Inc. Configurable delay limit for error control communications

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5629949A (en) * 1993-09-21 1997-05-13 Cirrus Logic, Inc. Error correction verification method and apparatus using CRC check remainders
JP3658829B2 (en) * 1996-02-05 2005-06-08 ソニー株式会社 Data communication method

Patent Citations (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5109384A (en) 1988-11-02 1992-04-28 Tseung Lawrence C N Guaranteed reliable broadcast network
US5629948A (en) * 1993-07-22 1997-05-13 Ntt Mobile Communications Network Inc. Data transmission scheme with automatic repeat request
US5617561A (en) 1994-12-22 1997-04-01 International Business Machines Corporation Message sequence number control in a virtual time system
US5930233A (en) 1995-05-09 1999-07-27 Nokia Telecommunications Oy Data transmission system with sliding-window data flow control
US6031818A (en) * 1997-03-19 2000-02-29 Lucent Technologies Inc. Error correction system for packet switching networks
US6289012B1 (en) 1998-08-03 2001-09-11 Instanton Corporation High concurrency data download apparatus and method
US6493342B1 (en) * 1998-09-11 2002-12-10 Teledesic Llc Method of data transmission in a data communication network
US6646987B1 (en) 1998-10-05 2003-11-11 Nortel Networks Limited Method and system for transmission control protocol (TCP) packet loss recovery over a wireless link
WO2000035163A1 (en) 1998-12-08 2000-06-15 Nokia Mobile Phones Ltd. A method for optimizing of data transmission
US6577642B1 (en) * 1999-01-15 2003-06-10 3Com Corporation Method and system for virtual network administration with a data-over cable system
WO2000060799A1 (en) 1999-04-06 2000-10-12 Telefonaktiebolaget Lm Ericsson (Publ) Packet discard notification for semi reliable retransmission protocol
US6349208B1 (en) 1999-04-28 2002-02-19 Nokia Corporation Apparatus and associated method for selectively permitting initiation or cell reselection in a radio communication system
US7330439B1 (en) 1999-05-21 2008-02-12 Nokia Corporation Packet data transmission in third generation mobile system
US6697331B1 (en) 1999-11-17 2004-02-24 Telefonaktiebolaget Lm Ericsson (Publ) Link layer acknowledgement and retransmission for cellular telecommunications
US6374117B1 (en) 1999-12-22 2002-04-16 Telefonaktiebolaget Lm Ericsson (Publ) Queue based power control scheduling
US7020083B2 (en) 2000-08-31 2006-03-28 The Regents Of The University Of California Method for improving TCP performance over wireless links
US6925096B2 (en) 2000-09-22 2005-08-02 Telefonaktiebolaget L M Ericsson (Publ) Method and apparatus for managing traffic flows
US20030012178A1 (en) 2001-04-06 2003-01-16 Mussman Harry Edward Alternate routing of voice communication in a packet-based network
US6937864B2 (en) 2001-05-04 2005-08-30 Samsung Electronics Co., Ltd. Transmission apparatus and method for multimedia service in mobile communication system
US7000021B1 (en) * 2001-10-12 2006-02-14 Cisco Technology, Inc. ARQ (automatic repeat request) for broadband fixed wireless network
US20070091908A1 (en) 2001-11-01 2007-04-26 Kabushiki Kaisha Toshiba Communication device and communication control method using efficient echonet address determination scheme
US20030174663A1 (en) 2002-03-15 2003-09-18 Douglas Dillon Method and system for providing differentiated quality of service diversity ALOHA
US7145889B1 (en) 2002-03-28 2006-12-05 Nortel Networks Limited Efficient frame retransmission in a wireless communication environment
US20030212827A1 (en) * 2002-05-08 2003-11-13 Abheek Saha Method and system for providing peer-to-peer exchange of terminal information over a meshed network
US7428595B2 (en) 2002-09-30 2008-09-23 Sharp Laboratories Of America, Inc. System and method for streaming TCP messages in an enterprise network
US20050141419A1 (en) 2003-06-17 2005-06-30 Cisco Technology, Inc. A Corporation Of California Methods and devices for the coordination of flow control between a TCP/IP network and other networks
US20050022097A1 (en) 2003-07-22 2005-01-27 Jung-Fu Cheng Adaptive hybrid ARQ algorithms
WO2005060200A1 (en) 2003-12-17 2005-06-30 Telefonaktiebolaget Lm Ericsson (Publ) Technique for handling outdated information units
US7394762B2 (en) 2004-04-21 2008-07-01 National University Of Ireland Maynooth Congestion control in data networks
US20080317017A1 (en) 2004-08-31 2008-12-25 Henning Wiemann Data Unit Sender and Data Unit Relay Device
US20060098659A1 (en) * 2004-11-05 2006-05-11 Silicon Graphics Inc. Method of data packet transmission in an IP link striping protocol
US20080212510A1 (en) 2005-07-07 2008-09-04 Peter Larsson Method and Arrangement for Coding and Scheduling in Packet Data Communication Systems
US7787372B2 (en) 2005-12-12 2010-08-31 Viasat, Inc. Transmission control protocol with performance enhancing proxy for degraded communication channels
US7881205B2 (en) 2007-01-24 2011-02-01 Viasat, Inc. Configurable delay limit for error control communications

Non-Patent Citations (18)

* Cited by examiner, † Cited by third party
Title
Andrei Gurtov, Reiner Ludwig: "Lifetime Packet Discard for Efficient Real-Time Transport over Cellular Links", Nov. 26, 2003, pp. 1-14.
Final Office Action of Mar. 24, 2010 for U.S. Appl. No. 11/298,612; 8 pages.
International Search Report dated Feb. 2, 2009, International Application No. PCT/US2008/051941, filed Jan. 24, 2008, 6 pages.
Interview Summary of May 25, 2010 for U.S. Appl. No. 11/298,612; 5 pages.
Invitation to Pay Additional Fees and, Where Applicable, Protest Fee, International Searching Authority, dated Jul. 23, 2008, corresponding to PCT Application No. PCT/US2008/051941, including results of the Partial International Search.
Non-Final Office Action of Oct. 28, 2008 for U.S. Appl. No. 11/298,612; 19 pages.
Non-Final Office Action of Sep. 16, 2009 for U.S. Appl. No. 11/298,612; 10 pages.
Notice of Allowance of Apr. 30, 2010 for U.S. Appl. No. 11/298,612; 5 pages.
Notice of Allowance of Dec. 6, 2010 for U.S. Appl. No. 12/019,287; 18 pages.
Notice of Allowance of Nov. 3, 2010 for U.S. Appl. No. 12/019,292; 17 pages.
Phoel W G: "Concepts for Reliable Satellite Communications Over Blockage Channels", IEEE Military Corrimunications Conference, Oct. 17, 2005-Oct. 20, 2005, pp. 1-6.
Restriction Requirement of Jun. 4, 2009 for U.S. Appl. No. 11/298,612; 4 pages.
Supplemental Notice of Allowability of Dec. 23, 2010 for U.S. Appl. No. 12/019,292; 3 pages.
Supplemental Notice of Allowability of Jan. 31, 2011 for U.S. Appl. No. 12/019,287; 5 pages.
U.S. Appl. No. 12/019,287, Office Action dated Jun. 23, 2010, 28 pages.
U.S. Appl. No. 12/019,287, Office Action dated Oct. 29, 2009, 23 pages.
U.S. Appl. No. 12/019,292, Office Action dated Apr. 27, 2010, 27 pages.
Written Opinion of Jul. 24, 2009 for PCT Patent Application No. PCT/US2008/051941; 12 pages.

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220014500A1 (en) * 2018-02-28 2022-01-13 Palo Alto Networks, Inc. Identifying security risks and enforcing policies on encrypted/encoded network communications
US12095728B2 (en) * 2018-02-28 2024-09-17 Palo Alto Networks, Inc. Identifying security risks and enforcing policies on encrypted/encoded network communications

Also Published As

Publication number Publication date
US20080177884A1 (en) 2008-07-24
WO2008092023A2 (en) 2008-07-31
US7920477B2 (en) 2011-04-05
US20080175155A1 (en) 2008-07-24
CN101641898A (en) 2010-02-03
US7881205B2 (en) 2011-02-01
WO2008092023A3 (en) 2009-03-19
EP2119085A2 (en) 2009-11-18
US20080175247A1 (en) 2008-07-24
DE602008003100D1 (en) 2010-12-02
EP2119085B1 (en) 2010-10-20
ATE485646T1 (en) 2010-11-15

Similar Documents

Publication Publication Date Title
US8260935B2 (en) Error control terminal discovery and updating
US8958411B2 (en) Method of transmitting RLC data
US8392616B2 (en) Method and apparatus for transmitting header-compressed packet based on retransmission mechanism
JP5588019B2 (en) Method and apparatus for analyzing a network abstraction layer for reliable data communication
US20170149675A1 (en) Packet retransmission method and apparatus
AU2003276747B2 (en) Method for moving a receive window in a radio access network
US9049017B2 (en) Efficient TCP ACK prioritization in wireless networks
JP5215413B2 (en) Status report for retransmission protocol
US20120140704A1 (en) Method and apparatus for controlling downlink data transmission in a multi-hop relay communication system
US20120170445A1 (en) Efficient application-layer automatic repeat request retransmission method for reliable real-time data streaming in networks
US8085669B2 (en) Session relay device and session relay method
US10142206B2 (en) Method and apparatus for packet communication using header compression
KR20070100196A (en) Communication system, transmitter and receiver
JP2001308947A (en) Communication device, repeater and communication control method
US20220225163A1 (en) Communications device, infrastructure equipment and methods
JP2008153778A (en) Packet transfer apparatus
US9510242B2 (en) Reducing superfluous traffic in a network
Bhargava et al. Analysis of Different Congestion Avoidance Algorithms
US20150071273A1 (en) Efficient transfer of tcp traffic over wlan
Rocha et al. Performance evaluation of DTSN in wireless sensor networks
WO2020154872A1 (en) Transmission control protocol acceleration method and apparatus
JP3923977B2 (en) Gateway device
JP2013157706A (en) Radio communication device and communication control method
JP2005102340A (en) Gateway apparatus
WO2008096908A1 (en) Method of transmitting packet in low power wireless personal area network and low power wireless personal area network performing the same

Legal Events

Date Code Title Description
AS Assignment

Owner name: VIASAT, INC., CALIFORNIA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:AGARWAL, ANIL;REEL/FRAME:020766/0851

Effective date: 20080404

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

AS Assignment

Owner name: UNION BANK, N.A., CALIFORNIA

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIASAT, INC.;REEL/FRAME:028184/0152

Effective date: 20120509

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATE

Free format text: SECURITY INTEREST;ASSIGNOR:VIASAT, INC.;REEL/FRAME:048715/0589

Effective date: 20190327

Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS COLLATERAL TRUSTEE, MINNESOTA

Free format text: SECURITY INTEREST;ASSIGNOR:VIASAT, INC.;REEL/FRAME:048715/0589

Effective date: 20190327

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 8

AS Assignment

Owner name: BANK OF AMERICA, N.A., NORTH CAROLINA

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIASAT, INC.;REEL/FRAME:059332/0558

Effective date: 20220304

AS Assignment

Owner name: BANK OF AMERICA, N.A., AS AGENT, NORTH CAROLINA

Free format text: SECURITY AGREEMENT;ASSIGNOR:VIASAT, INC.;REEL/FRAME:063822/0446

Effective date: 20230530

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12